A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.01.01Keywords:
Post-Quantum Cryptography (PQC), Deep Neural Networks (DNN), Intrusion Detection System (IDS), Hybrid Security Framework, Downgrade Attack Detection, CRYSTALS-Kyber, Quantum-Resilient Encryption, Machine Learning SecurityDimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The evolution from conventional cryptography to post-quantum cryptography (PQC) is underway across managements and innovativeness to alleviate the risk modelled by large-scale quantum processers. Though, throughout this migration era, factual systems remain susceptible to downgrade attacks, where an adversary forces terminuses to transfer weaker, bequest procedures notwithstanding joint PQC support. This study offers a real-world intrusion detection method according to DNNs to classify PQC practice, differentiate legacy traffic, and perceive downgrade attacks among network traffic and bot action. This study proposes a hybrid ML framework-based intrusion detection system (IDS) with a (PQC)-ready protection pipeline. A DT classifier qualified on system flow structures attains great accurateness in distinctive benign from spiteful traffic. Model yields are held using AES-GCM for confidentiality and integrity, with asymmetric key encapsulation (virtual via RSA) and digital signs (virtual via Ed25519) to confirm legitimacy and non-negation. The project is linked: RSA could be substituted by CRYSTALS-Kyber for main encapsulation and Ed25519 by CRYSTALS-Dilithium for signatures short of changing the system architecture. The outcomes prove that the combined ML+PQC pipeline is effective, explainable, and prepared for quantum- tough disposition. We define a label-engineering pipeline which allocates PQC- likeness scores from handshake-derived structures, a downgrade classification approach as per user performance over time, and a class- weighted DNN classifier qualified to discrete PQC, bequest, reduce, and bot programs. Trials on CICIDS2018-derived traffic require test correctness exceptional 98%, with strong performance on the extreme downgrade class. We provide deployment guidance for structure PQC-aware intrusion exposure into actual migration programs.Abstract
How to Cite
Downloads
Similar Articles
- S. Dhivya, S. Prakash, Power quality assessment in solar-connected smart grids via hybrid attention-residual network for power quality (HARN-PQ) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Suprabha Amit Kshatriya, Jaymin K Bhalani, Early detection of fire and smoke using motion estimation algorithms utilizing machine learning , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- G. Hemamalini, V. Maniraj, Enhanced otpmization based support vector machine classification approach for the detection of knee arthritis , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- M. Menaha, J. Lavanya, Crop yield prediction in diverse environmental conditions using ensemble learning , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Bio-Inspired and Machine Learning-Driven Multipath Routing Protocol for MANETs Using Predictive Link Analytics , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Amudavalli L, K. Muthuramalingam, Integrated energy-efficient routing and secure data management for location-aware wireless sensor networks with PFO leveraged improved fuzzy unequal clustering algorithm (IFUC) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Engida Admassu, Classifying enset based on their disease tolerance using deep learning , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Shaik Abdulla P., Abdul Razak T., Retrieval-Based Inception V3-Net Algorithm and Invariant Data Classification using Enhanced Deep Belief Networks for Content-Based Image Retrieval , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- I.Bhuvaneshwarri, M. N. Sudha, An implementation of secure storage using blockchain technology on cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 4 5 6 7 8 9 10 11 12 13 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

