Denis Berger
Post-Quantum Migration of the Tor Application
Berger, Denis; Lemoudden, Mouad; Buchanan, William J
Authors
Mouad Lemoudden M.Lemoudden@napier.ac.uk
Lecturer
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Abstract
The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt later attack in the near future. This dissertation proposes an overview of the cryptographic schemes used by Tor, highlighting the non-quantum-resistant ones and introducing theoretical performance assessment methods of a local Tor network. The measurement is divided into three phases. We start with benchmarking a local Tor network simulation on constrained devices to isolate the time taken by classical cryptography processes. Secondly, the analysis incorporates existing benchmarks of quantum-secure algorithms and compares these performances on the devices. Lastly, the estimation of overhead is calculated by replacing the measured times of traditional cryptography with the times recorded for Post-Quantum Cryptography (PQC) execution within the specified Tor environment. By focusing on the replaceable cryptographic components, using theoretical estimations, and leveraging existing benchmarks, valuable insights into the potential impact of PQC can be obtained without needing to implement it fully.
Citation
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025). Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013
Journal Article Type | Article |
---|---|
Acceptance Date | Mar 25, 2025 |
Online Publication Date | Apr 1, 2025 |
Publication Date | 2025-04 |
Deposit Date | Apr 1, 2025 |
Publicly Available Date | Apr 1, 2025 |
Journal | Journal of Cybersecurity and Privacy |
Electronic ISSN | 2624-800X |
Publisher | MDPI |
Peer Reviewed | Peer Reviewed |
Volume | 5 |
Issue | 2 |
Article Number | 13 |
DOI | https://doi.org/10.3390/jcp5020013 |
Keywords | Tor; post-quantum cryptography; NIST; onion routing |
Public URL | http://researchrepository.napier.ac.uk/Output/4204089 |
Publisher URL | https://www.mdpi.com/2624-800X/5/2/13 |
Build resilient infrastructure, promote inclusive and sustainable industrialisation and foster innovation
Files
Post-Quantum Migration of the Tor Application
(2.1 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Hybrid Email Spam Detection Model Using Artificial Intelligence
(2020)
Journal Article
A Binary-based MapReduce Analysis for Cloud Logs
(2016)
Journal Article
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming
(2017)
Journal Article
Attacking Windows Hello for Business: Is It What We Were Promised?
(2023)
Journal Article