Journal of Cybersecurity and Information Management
JCIM
2690-6775
2769-7851
10.54216/JCIM
https://www.americaspg.com/journals/show/3729
2019
2019
Modify Block Chain Environment based on Post-quantum Algorithms
Informatics Institute for Postgraduate studies, Information Technology & Communication University, Baghdad, Iraq
Rasha
Rasha
Computer Sciences Department, University of Technology, Baghdad, Iraq
Hala Bahjat Abdul
Wahab
Blockchain technology provides reliable data storage and secures transactions, however, is not suitable for devices with low resources because of its high computational and resource requirements. As quantum computing develops, it poses concerns regarding a cryptographic integrity of blockchain, making them more vulnerable to attacks. Blockchain technology is being used to enhance security and performance. The application of the post-quantum Ascon algorithm in a blockchain setting is presented in this paper. The Ascon hashing algorithm offers a lightweight, efficient architecture for resource-constrained applications, including mobile devices or Internet of Things-based blockchains. By providing high-speed hashing, authentication features, and defense against quantum attacks, it enhances performance and guarantees strong security without putting a strain on network infrastructure. The experimental results show using the Ascon algorithm in a blockchain environment is successful in reducing resource usage and execution time and significantly increasing randomness and unpredictability. Post-quantum Ascon algorithms overcome the drawbacks of traditional technologies and ensure that blockchain systems continue to withstand the new risks posed by quantum computing while increasing overall efficiency
2025
2025
151
161
10.54216/JCIM.160112
https://www.americaspg.com/articleinfo/2/show/3729