Post-Quantum Migration of the Tor Application

The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt later attack in the near future. This disserta...

Full description

Saved in:
Bibliographic Details
Main Authors: Denis Berger, Mouad Lemoudden, William J. Buchanan
Format: Article
Language:English
Published: MDPI AG 2025-04-01
Series:Journal of Cybersecurity and Privacy
Subjects:
Online Access:https://www.mdpi.com/2624-800X/5/2/13
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849472383332646912
author Denis Berger
Mouad Lemoudden
William J. Buchanan
author_facet Denis Berger
Mouad Lemoudden
William J. Buchanan
author_sort Denis Berger
collection DOAJ
description The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt later attack in the near future. This dissertation proposes an overview of the cryptographic schemes used by Tor, highlighting the non-quantum-resistant ones and introducing theoretical performance assessment methods of a local Tor network. The measurement is divided into three phases. We start with benchmarking a local Tor network simulation on constrained devices to isolate the time taken by classical cryptography processes. Secondly, the analysis incorporates existing benchmarks of quantum-secure algorithms and compares these performances on the devices. Lastly, the estimation of overhead is calculated by replacing the measured times of traditional cryptography with the times recorded for Post-Quantum Cryptography (PQC) execution within the specified Tor environment. By focusing on the replaceable cryptographic components, using theoretical estimations, and leveraging existing benchmarks, valuable insights into the potential impact of PQC can be obtained without needing to implement it fully.
format Article
id doaj-art-2dfd7d873a85454db99f8f7602f4fd42
institution Kabale University
issn 2624-800X
language English
publishDate 2025-04-01
publisher MDPI AG
record_format Article
series Journal of Cybersecurity and Privacy
spelling doaj-art-2dfd7d873a85454db99f8f7602f4fd422025-08-20T03:24:33ZengMDPI AGJournal of Cybersecurity and Privacy2624-800X2025-04-01521310.3390/jcp5020013Post-Quantum Migration of the Tor ApplicationDenis Berger0Mouad Lemoudden1William J. Buchanan2Blockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UKBlockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UKBlockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UKThe efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt later attack in the near future. This dissertation proposes an overview of the cryptographic schemes used by Tor, highlighting the non-quantum-resistant ones and introducing theoretical performance assessment methods of a local Tor network. The measurement is divided into three phases. We start with benchmarking a local Tor network simulation on constrained devices to isolate the time taken by classical cryptography processes. Secondly, the analysis incorporates existing benchmarks of quantum-secure algorithms and compares these performances on the devices. Lastly, the estimation of overhead is calculated by replacing the measured times of traditional cryptography with the times recorded for Post-Quantum Cryptography (PQC) execution within the specified Tor environment. By focusing on the replaceable cryptographic components, using theoretical estimations, and leveraging existing benchmarks, valuable insights into the potential impact of PQC can be obtained without needing to implement it fully.https://www.mdpi.com/2624-800X/5/2/13Torpost-quantum cryptographyNISTonion routing
spellingShingle Denis Berger
Mouad Lemoudden
William J. Buchanan
Post-Quantum Migration of the Tor Application
Journal of Cybersecurity and Privacy
Tor
post-quantum cryptography
NIST
onion routing
title Post-Quantum Migration of the Tor Application
title_full Post-Quantum Migration of the Tor Application
title_fullStr Post-Quantum Migration of the Tor Application
title_full_unstemmed Post-Quantum Migration of the Tor Application
title_short Post-Quantum Migration of the Tor Application
title_sort post quantum migration of the tor application
topic Tor
post-quantum cryptography
NIST
onion routing
url https://www.mdpi.com/2624-800X/5/2/13
work_keys_str_mv AT denisberger postquantummigrationofthetorapplication
AT mouadlemoudden postquantummigrationofthetorapplication
AT williamjbuchanan postquantummigrationofthetorapplication