This study assesses quantum-safe virtual private networks to backbones of financial institutions that experience harvest-now-decrypt-later risk. It integrates hybrid key exchange with X25519 and Kyber, as well as KEM-authenticated TLS. A testbed is used to simulate metro, regional, and long-haul paths (10, 50, and 100 ms round-trip, 1 percent loss), measuring time to first valid packet, goodput, fragmentation, and CPU utilization, as researchers vary the MTU, NAT-T, and offload. The threat model includes passive recording, active downgrade, man-in-the-middle attack interference, and insider misuse: experimental MOS-PK 47, 48. Greater post-quantum artifacts and HelloRetry/IKE cookies challenges increase control-plane cost, driving cold-start latency to hundreds of milliseconds on very long-haul links. Throughput on the data plane remains several percent apart from classical. Jumbo frames minimise the CPU load of software gateways, and ASIC offloading can be used to prevent capacity loss. The primary failure inducers are path-MTU black-holing as enlarged handshakes cross mixed-MPLS and Internet paths. Silent drops are eliminated with MSS closer to 1360 bytes, deterministic DF policy, active PMTUD, and IKE fragmentation stabilizes rekeys. The study provides a deployment playbook that jitters and batches rekeys, pins cipher suites, and monitors golden signals, and advances a blueprint that is auditable. The ability to migrate PKI with hybrid or cross-chained hierarchies, OCSP stapling, uniform telemetry, and cohort-based promotion provides the needed crypto agility without breaking service levels. The feasibility is proven, and regular validation and reassessment drills address residual risk.
How to Cite
Ashutosh Chandra Jha. (2024). Quantum-Safe VPNs for Financial Institution Backbones. Frontiers in Emerging Computer Science and Information Technology, 1(2), 50β74. Retrieved from https://irjernet.com/index.php/fecsit/article/view/178
πBock, L. (2022). Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark. Packt Publishing Ltd.
πCao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Communications Surveys & Tutorials, 24(2), 839-894.
πChavan, A. (2023). Managing scalability and cost in microservices architecture: Balancing infinite scalability with financial constraints. Journal of Artificial Intelligence & Cloud Computing, 2, E264. http://doi.org/10.47363/JAICC/2023(2)E264
πEbrahim, Y. K. (2020). Security analysis of website certificate validation.
πFriedberger, S. (2019). Security of Cryptographic Implementations.
πGai, S. (2020). Building a future-proof cloud infrastructure: A unified architecture for network, security, and storage services. Addison-Wesley Professional.
πGavazzi, A., Williams, R., Kirda, E., Lu, L., King, A., Davis, A., & Leek, T. (2023). A study of {Multi-Factor} and {Risk-Based} authentication availability. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 2043-2060).
πHadan, H., Serrano, N., & Camp, L. J. (2021). A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents. Journal of Cybersecurity, 7(1), tyab025.
πJoshi, R. (2022). In-Network Techniques for Highly Reliable Datacenter Networks (Doctoral dissertation, National University of Singapore (Singapore)).
πJoshua, T. (2023). A Secure Model for Student Results Verification Using Salted Hash Functions.
πKhazraee, M. (2020). Reducing the development cost of customized hardware acceleration for cloud infrastructure. University of California, San Diego.
πKjell, E., & Frisenfelt, S. (2021). Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild.
πKumar, V. (2023). Digital hotspots. In The Economic Value of Digital Disruption: A Holistic Assessment for CXOs (pp. 689-795). Singapore: Springer Nature Singapore.
πLiechti, L., Gouveia, P., Neves, J., Kropf, P., Matos, M., & Schiavoni, V. (2019, October). THUNDERSTORM: a tool to evaluate dynamic network topologies on distributed systems. In 2019 38th Symposium on Reliable Distributed Systems (SRDS) (pp. 241-24109). IEEE.
πNawrocki, M., Blendin, J., Dietzel, C., Schmidt, T. C., & WΓ€hlisch, M. (2019, October). Down the black hole: dismantling operational practices of BGP blackholing at IXPs. In Proceedings of the Internet Measurement conference (pp. 435-448).
πNyati, S. (2018). Revolutionizing LTL carrier operations: A comprehensive analysis of an algorithm-driven pickup and delivery dispatching solution. International Journal of Science and Research (IJSR), 7(2), 1659-1666. Retrieved from https://www.ijsr.net/getabstract.php?paperid=SR24203183637
πNyati, S. (2018). Transforming telematics in fleet management: Innovations in asset tracking, efficiency, and communication. International Journal of Science and Research (IJSR), 7(10), 1804-1810. Retrieved from https://www.ijsr.net/getabstract.php?paperid=SR24203184230
πPachilakis, M., Chariton, A. A., Papadopoulos, P., Ilia, P., Degkleri, E., & Markatos, E. P. (2020). Design and implementation of a compressed certificate status protocol. ACM Transactions on Internet Technology (TOIT), 20(4), 1-25.
πPalmer, M. R. (2022). Towards enabling cross-layer information sharing to improve today's content delivery systems.
πPouttu, A. (2020). 6G white paper on validation and trials for verticals towards 2030βs.
πPutters, J., Hashemi, J. B., & Yavuz, A. (2023). Demystifying public cloud auditing for IT auditors. Advanced Digital Auditing, 185.
πRao, S. P. (2023). Analyzing Communications and Software Systems Security.
πSabanci, K. (2023). Exploring post-quantum cryptographic schemes for TLS in 5G NB-IOT: Feasibility and recommendations (Master's thesis, Marquette University).
πSardana, J. (2022). Scalable systems for healthcare communication: A design perspective. International Journal of Science and Research Archive. https://doi.org/10.30574/ijsra.2022.7.2.0253
πSchΓ€ge, S., Schwenk, J., & Lauer, S. (2020, April). Privacy-preserving authenticated key exchange and the case of IKEv2. In IACR International Conference on Public-Key Cryptography (pp. 567-596). Cham: Springer International Publishing.
πSchwabe, P., Stebila, D., & Wiggers, T. (2020, October). Post-quantum TLS without handshake signatures. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 1461-1480).
πShantharama, P., Thyagaturu, A. S., & Reisslein, M. (2020). Hardware-accelerated platforms and infrastructures for network functions: A survey of enabling technologies and research studies. IEEE Access, 8, 132021-132085.
πSharma, N. (2023). Legacy apps to cloud: A risk-based approach. Cyber Security: A Peer-Reviewed Journal, 7(1), 16-23.
πWu, P. (2019). Analysis of the WireGuard protocol. Master's Thesis, Analysis of the WireGuard protocol, Eindhoven University of Technology.
πWu, Y., Chai, B., Li, Y., Liu, B., Li, J., Yang, Y., & Jiang, W. (2023, May). An empirical study on change-induced incidents of online service systems. In 2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 234-245). IEEE.
πYang, B., Xue, W., Zhang, T., Liu, S., Ma, X., Wang, X., & Liu, W. (2023). End-to-end I/O monitoring on leading supercomputers. ACM Transactions on Storage, 19(1), 1-35.