Journal of Cybersecurity and Information Management JCIM 2690-6775 2769-7851 10.54216/JCIM https://www.americaspg.com/journals/show/3729 2019 2019 Modify Block Chain Environment based on Post-quantum Algorithms Informatics Institute for Postgraduate studies, Information Technology & Communication University, Baghdad, Iraq Rasha Rasha Computer Sciences Department, University of Technology, Baghdad, Iraq Hala Bahjat Abdul Wahab Blockchain technology provides reliable data storage and secures transactions, however, is not suitable for devices with low resources because of its high computational and resource requirements. As quantum computing develops, it poses concerns regarding a cryptographic integrity of blockchain, making them more vulnerable to attacks. Blockchain technology is being used to enhance security and performance. The application of the post-quantum Ascon algorithm in a blockchain setting is presented in this paper. The Ascon hashing algorithm offers a lightweight, efficient architecture for resource-constrained applications, including mobile devices or Internet of Things-based blockchains. By providing high-speed hashing, authentication features, and defense against quantum attacks, it enhances performance and guarantees strong security without putting a strain on network infrastructure. The experimental results show using the Ascon algorithm in a blockchain environment is successful in reducing resource usage and execution time and significantly increasing randomness and unpredictability. Post-quantum Ascon algorithms overcome the drawbacks of traditional technologies and ensure that blockchain systems continue to withstand the new risks posed by quantum computing while increasing overall efficiency 2025 2025 151 161 10.54216/JCIM.160112 https://www.americaspg.com/articleinfo/2/show/3729