University of Bahrain
College of Information Technology
Department of Information Systems

POST QUANTUM CRYPTOGRAPHY
AND ITS IMPLICATIONS

Senior Project • ITCY 499 • Academic Year 2025-2026 Semester 1

Explore the Project

Prepared by: Maryam Rashed Alkawari • Saeeda Mohammed Alansari • Danah Mohammed Alkhan

Project Supervisor: Dr. Alya Sayed Alkameli

Project Summary

Abstract

The emergence of quantum computing poses an unexpected threat to current cryptography, as quantum algorithms like Shor's algorithm will make widely used encryption methods such as RSA and ECC obsolete. The “Harvest Now, Decrypt Later” threat introduces another level of urgency. Although NIST standardized post-quantum algorithms in 2024, current IT governance standards have a lack of clear transition requirements.

This research developed the Post-Quantum Cryptography Governance Framework (PQC-GF), a comprehensive roadmap enabling organizations to systematically transition to quantum-resistant cryptographic systems. The PQC-GF consists of five domains: QRAS, PQPA, IAD, OAM, and CAA. Three surveys were conducted: an awareness survey with 128 public respondents, and pre- and post-presentation surveys for 35 cybersecurity students. Four cryptographic prototypes demonstrate the differences between classical cryptography and post-quantum cryptography in practical scenarios. The PQC-GF fills the existing gap offering an applicable framework that is tailored based on organizational maturity level, risk profile, and availability of resources.

The Challenge

The Quantum Threat

Quantum computers have the potential to break the encryption protecting our banks, hospitals, governments, and businesses. Organizations must start preparing now, but most do not know how to begin.

Discovery

How do we find and assess all quantum-vulnerable systems?

Selection

Which post-quantum algorithm should we use, and where?

Transition

How do we migrate without breaking everything?

Our Solution

The PQC-GF Framework

A comprehensive five-domain framework designed to guide organizations through quantum-safe transitions.

QRAS

Quantum Risk Assessment & Strategy

Establishing quantum threat understanding and strategic direction

PQPA

Post-Quantum Planning & Architecture

Designing quantum-safe target states and migration approaches

IAD

Implementation & Deployment

Executing post-quantum cryptography implementations

OAM

Operations & Maintenance

Managing ongoing post-quantum cryptography operations

CAA

Compliance & Assurance

Ensuring regulatory compliance and stakeholder confidence

Research Findings

Evidence & Impact

128 Public Survey Respondents
35 Cybersecurity Students
39.1% Initial PQC Awareness
45.7% Post-Training Awareness

Key Findings

Technical Validation

Cryptographic Implementations

Demonstrating 4 Implementation methods classical and post-quantum encryption systems.

CRYSTALS-Kyber (ML-KEM-512)

Post-Quantum Key Encapsulation

Quantum-resistant key exchange with text and image encryption in under 20 milliseconds.

NIST-standardized lattice-based cryptography

CRYSTALS-Dilithium (ML-DSA-65)

Digital Signatures

Authenticated encryption with digital signatures for data integrity in 127-167 milliseconds.

NIST-standardized signature algorithm

RSA-2048

Classical Cryptography

Traditional public-key encryption with hybrid approach for larger files. Baseline comparison.

Current industry standard (quantum-vulnerable)

BB84 QKD

Quantum Key Distribution

Simulated quantum cryptography with QR code-based key distribution demonstrating QKD principles.

Quantum communication protocol simulation

Our Team

Researchers

Maryam Rashed Alkawari

202103597

Saeeda Mohammed Alansari

202106563

Danah Mohammed Alkhan

202100476

Project Supervisor

Dr. Alya Sayed Alkameli

Computer Science Department

aalkameli@uob.edu.bh

University of Bahrain • College of Information Technology • Department of Information Systems

ITCY 499 - Senior Project • Academic Year 2025-2026 Semester 1