A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.01.01Keywords:
Post-Quantum Cryptography (PQC), Deep Neural Networks (DNN), Intrusion Detection System (IDS), Hybrid Security Framework, Downgrade Attack Detection, CRYSTALS-Kyber, Quantum-Resilient Encryption, Machine Learning SecurityDimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The evolution from conventional cryptography to post-quantum cryptography (PQC) is underway across managements and innovativeness to alleviate the risk modelled by large-scale quantum processers. Though, throughout this migration era, factual systems remain susceptible to downgrade attacks, where an adversary forces terminuses to transfer weaker, bequest procedures notwithstanding joint PQC support. This study offers a real-world intrusion detection method according to DNNs to classify PQC practice, differentiate legacy traffic, and perceive downgrade attacks among network traffic and bot action. This study proposes a hybrid ML framework-based intrusion detection system (IDS) with a (PQC)-ready protection pipeline. A DT classifier qualified on system flow structures attains great accurateness in distinctive benign from spiteful traffic. Model yields are held using AES-GCM for confidentiality and integrity, with asymmetric key encapsulation (virtual via RSA) and digital signs (virtual via Ed25519) to confirm legitimacy and non-negation. The project is linked: RSA could be substituted by CRYSTALS-Kyber for main encapsulation and Ed25519 by CRYSTALS-Dilithium for signatures short of changing the system architecture. The outcomes prove that the combined ML+PQC pipeline is effective, explainable, and prepared for quantum- tough disposition. We define a label-engineering pipeline which allocates PQC- likeness scores from handshake-derived structures, a downgrade classification approach as per user performance over time, and a class- weighted DNN classifier qualified to discrete PQC, bequest, reduce, and bot programs. Trials on CICIDS2018-derived traffic require test correctness exceptional 98%, with strong performance on the extreme downgrade class. We provide deployment guidance for structure PQC-aware intrusion exposure into actual migration programs.Abstract
How to Cite
Downloads
Similar Articles
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Pravin P. Adivarekar1, Amarnath Prabhakaran A, Sukhwinder Sharma, Divya P, Muniyandy Elangovan, Ravi Rastogi, Automated machine learning and neural architecture optimization , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Pallavi M. Shimpi, Nitin N. Pise, Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Effective gorilla troops optimization-based hierarchical clustering with HOP field neural network for intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S Selvakumari, M Durairaj, Performance Analysis of Deep Learning Optimizers for Arrhythmia Classification using PTB-XL ECG Dataset: Emphasis on Adam Optimizer , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- V Anitha, Seema Sharma, R. Jayavadivel, Akundi Sai Hanuman, B Gayathri, R. Rajagopal, A network for collaborative detection of intrusions in smart cities using blockchain technology , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Advancements in image quality assessment: a comparative study of image processing and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- P S Renjeni, B Senthilkumaran, Ramalingam Sugumar, L. Jaya Singh Dhas, Gaussian kernelized transformer learning model for brain tumor risk factor identification and disease diagnosis , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

