{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T15:03:16Z","timestamp":1772463796653,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Internal Affairs and Communications","award":["JPJ000254"],"award-info":[{"award-number":["JPJ000254"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network"],"abstract":"<jats:p>Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum Cryptography (PQC) algorithms will have on various applications without the actual implementation of quantum-resistant cryptography. On the other hand, PQC algorithms come with complexity and long processing times, which may impact the quality of service (QoS) of many applications. Therefore, PQC-based protocols with practical implementations across various applications are essential. This paper introduces a new framework for PQC standalone and PQC\u2013AES (Advanced Encryption Standard) hybrid public-key encryption (PKE) protocols. Building on prior results, we focus on securing applications such as file transfer, video streaming, and chat-based communication using enhanced PQC-based protocols. The extended PQC-based protocols use a sequence number-based mechanism to effectively counter replay and man-in-the-middle attacks and mitigate standard cybersecurity attack vectors. Experimental evaluations examined encryption\/decryption speeds, throughput, and processing overhead for the standalone PQC and the PQC\u2013AES hybrid schemes, benchmarking them against traditional AES-256 in an existing client\u2013server environment. The results demonstrate that the new approaches achieve a significant balance between security and system performance compared to conventional deployments. Furthermore, a comprehensive security analysis confirms the robustness and effectiveness of the proposed PQC-based protocols across diverse attack scenarios. Notably, the PQC\u2013AES hybrid protocol demonstrates greater efficiency for applications handling larger data volumes (e.g., 10\u2013100 KB) with reduced latency, underscoring the practical necessity of carefully balancing security and operational efficiency in the post-quantum migration process.<\/jats:p>","DOI":"10.3390\/network5020020","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T09:59:14Z","timestamp":1749549554000},"page":"20","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication"],"prefix":"10.3390","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9897-0774","authenticated-orcid":false,"given":"Babatunde","family":"Ojetunde","sequence":"first","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0288, Japan"}]},{"given":"Takuya","family":"Kurihara","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0288, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2752-7534","authenticated-orcid":false,"given":"Kazuto","family":"Yano","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0288, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1026-3790","authenticated-orcid":false,"given":"Toshikazu","family":"Sakano","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0288, Japan"}]},{"given":"Hiroyuki","family":"Yokoyama","sequence":"additional","affiliation":[{"name":"Adaptive Communications Research Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0288, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,10]]},"reference":[{"key":"ref_1","unstructured":"Equal1 (2025, April 16). Bell-1: The First Quantum System Purpose-Built for the HPC Era. Available online: https:\/\/www.equal1.com\/post\/equal1-launches-bell-1-the-first-quantum-system-purpose-built-for-the-hpc-era."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/LSSC.2020.3018707","article-title":"A Fully Integrated DAC for CMOS Position-Based Charge Qubits with Single-Electron Detector Loopback Testing","volume":"3","author":"Esmailiyan","year":"2020","journal-title":"IEEE Solid-State Circuits Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/OJSSCS.2022.3213528","article-title":"Cryogenic Controller for Electrostatically Controlled Quantum Dots in 22-nm Quantum SoC","volume":"2","author":"Staszewski","year":"2022","journal-title":"IEEE Open J. Solid-State Circuits Soc."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Barker, W., Polk, W., and Souppaya, M. (2021). Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms, National Institute of Standards and Technology (NIST). NIST Cybersecurity White Paper.","DOI":"10.6028\/NIST.CSWP.15"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., and Smith-Tone, D. (2016). Report on Post-Quantum Cryptography, National Institute of Standards and Technology (NIST). NIST Internal Report 8105.","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Miller, C., Moody, D., and Peralta, R. (2022). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process, National Institute of Standards and Technology (NIST). NIST Internal Report 8413-upd1.","DOI":"10.6028\/NIST.IR.8413"},{"key":"ref_7","unstructured":"(2024). Recommendations for Key-Encapsulation Mechanisms (Standard No. Special Publication 800-227)."},{"key":"ref_8","unstructured":"(2024). Module-Lattice-based Key-Encapsulation Mechanism (Standard No. FIPS 203)."},{"key":"ref_9","unstructured":"(2024). Module-Lattice-Based Digital Signature Standard (Standard No. FIPS 204)."},{"key":"ref_10","unstructured":"(2024). Stateless Hash-Based Digital Signature Standard (Standard No. FIPS 205)."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Alagic, G., Bros, M., Ciadoux, P., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y., and Miller, C. (2025). Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process, National Institute of Standards and Technology (NIST). NIST Internal Report (NIST IR 8545).","DOI":"10.6028\/NIST.IR.8545"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ojetunde, B., Kurihara, T., Yano, K., Sakano, T., and Yokoyama, H. (2025, January 10\u201313). Performance Evaluation of Post-Quantum Cryptography Algorithms for Secure Communication in Wireless Networks. Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC2025), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC54725.2025.10975932"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Cooper, D.A., Apon, D.C., Dang, Q.H., Davidson, M.S., Dworkin, M.J., and Miller, C.A. (2020). Recommendation for Stateful Hash-Based Signature Schemes, National Institute of Standards and Technology (NIST). NIST Special Publication 800-208.","DOI":"10.6028\/NIST.SP.800-208"},{"key":"ref_14","unstructured":"Ghosh, S., Upadhyay, S., and Saki, A.A. (2023). A Primer on Security of Quantum Computing. arXiv."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"972","DOI":"10.12720\/jcm.17.12.972-978","article-title":"Quantum Encryption and Decryption in IBMQ Systems using Quantum Permutation Pad","volume":"17","author":"Perepechaenko","year":"2022","journal-title":"J. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Schwabe, P., Stebila, D., and Wiggers, T. (2020, January 9\u201313). Post-Quantum TLS Without Handshake Signatures. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event.","DOI":"10.1145\/3372297.3423350"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Bertino, E., Shulman, H., and Waidner, M. (2021). More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys. Computer Security\u2014ESORICS 2021, Springer. Lecture Notes in Computer Science 12972.","DOI":"10.1007\/978-3-030-88418-5"},{"key":"ref_18","unstructured":"Ateniese, G., and Venturi, D. (2022). KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip. Applied Cryptography and Network Security, ACNS 2022, Springer. Lecture Notes in Computer Science 13269."},{"key":"ref_19","unstructured":"Singh, R.P., Sarma, B.K., and Saikia, A. (2025, April 04). Public Key Cryptography Using Permutation P-Polynomials over Finite Fields. Cryptology ePrint Archive, Paper 2009\/208. Available online: https:\/\/eprint.iacr.org\/2009\/208.pdf."},{"key":"ref_20","unstructured":"Marco, L., Talayhan, A., and Vaudenay, S. (2025, April 04). Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger. Cryptology ePrint Archive, Paper 2023\/420. Available online: https:\/\/eprint.iacr.org\/2023\/420."},{"key":"ref_21","unstructured":"da Silva Lima, P., Ribeiro, L.A., Queiroz, R.J., Quintino, J.P., Silva, F.Q., Santos, A.L., and Roberto, J. (2025, May 30). Evaluating Kyber Post-Quantum KEM in a Mobile Application, Available online: https:\/\/csrc.nist.gov\/CSRC\/media\/Events\/third-pqc-standardization-conference\/documents\/accepted-papers\/ribeiro-evaluating-kyber-pqc2021.pdf."},{"key":"ref_22","unstructured":"Giron, A.A. (2025, April 04). Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement. Cryptology ePrint Archive, Paper 2023\/709. Available online: https:\/\/eprint.iacr.org\/2023\/709."},{"key":"ref_23","unstructured":"Liu, T., Ramachandran, G., and Jurdak, R. (2024). Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization. arXiv."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3390\/iot2010005","article-title":"Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms","volume":"2","author":"Asif","year":"2021","journal-title":"IoT"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Li, S., Yuxiang, C., Lin, C., Jing, L., Chanchan, K., Kuanching, L., Wei, L., and Naixue, X. (2023). Post-Quantum Security: Opportunities and Challenges. Sensors, 23.","DOI":"10.3390\/s23218744"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Balamurugan, C., Singh, K., Ganesan, G., and Rajarajan, M. (2021). Post-Quantum and Code-Based Cryptography\u2014Some Prospective Research Directions. Cryptography, 5.","DOI":"10.3390\/cryptography5040038"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"337","DOI":"10.11113\/mjfas.v19n3.2905","article-title":"Post-quantum Techniques in Wireless Network Security: An Overview","volume":"19","author":"Fakhruldeen","year":"2023","journal-title":"Malays. J. Fundam. Appl. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Lawo, D.C., Abu Bakar, R., Cano Aguilera, A., Cugini, F., Ima\u00f1a, J.L., Tafur Monroy, I., and Vegas Olmos, J.J. (2024). Wireless and Fiber-Based Post Quantum-Cryptography-Secured IPsec Tunnel. Future Internet, 16.","DOI":"10.3390\/fi16080300"},{"key":"ref_29","unstructured":"(2025, April 04). Liboqs. Available online: https:\/\/openquantumsafe.org\/liboqs\/."},{"key":"ref_30","unstructured":"Sharpe, R., Warnicke, E., and Lamping, U. (2025, May 30). Wireshark User\u2019s Guide. Version 4.5.0. Available online: https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/."}],"container-title":["Network"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2673-8732\/5\/2\/20\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:49:32Z","timestamp":1760032172000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2673-8732\/5\/2\/20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,10]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["network5020020"],"URL":"https:\/\/doi.org\/10.3390\/network5020020","relation":{},"ISSN":["2673-8732"],"issn-type":[{"value":"2673-8732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,10]]}}}