A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.01.01Keywords:
Post-Quantum Cryptography (PQC), Deep Neural Networks (DNN), Intrusion Detection System (IDS), Hybrid Security Framework, Downgrade Attack Detection, CRYSTALS-Kyber, Quantum-Resilient Encryption, Machine Learning SecurityDimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The evolution from conventional cryptography to post-quantum cryptography (PQC) is underway across managements and innovativeness to alleviate the risk modelled by large-scale quantum processers. Though, throughout this migration era, factual systems remain susceptible to downgrade attacks, where an adversary forces terminuses to transfer weaker, bequest procedures notwithstanding joint PQC support. This study offers a real-world intrusion detection method according to DNNs to classify PQC practice, differentiate legacy traffic, and perceive downgrade attacks among network traffic and bot action. This study proposes a hybrid ML framework-based intrusion detection system (IDS) with a (PQC)-ready protection pipeline. A DT classifier qualified on system flow structures attains great accurateness in distinctive benign from spiteful traffic. Model yields are held using AES-GCM for confidentiality and integrity, with asymmetric key encapsulation (virtual via RSA) and digital signs (virtual via Ed25519) to confirm legitimacy and non-negation. The project is linked: RSA could be substituted by CRYSTALS-Kyber for main encapsulation and Ed25519 by CRYSTALS-Dilithium for signatures short of changing the system architecture. The outcomes prove that the combined ML+PQC pipeline is effective, explainable, and prepared for quantum- tough disposition. We define a label-engineering pipeline which allocates PQC- likeness scores from handshake-derived structures, a downgrade classification approach as per user performance over time, and a class- weighted DNN classifier qualified to discrete PQC, bequest, reduce, and bot programs. Trials on CICIDS2018-derived traffic require test correctness exceptional 98%, with strong performance on the extreme downgrade class. We provide deployment guidance for structure PQC-aware intrusion exposure into actual migration programs.Abstract
How to Cite
Downloads
Similar Articles
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Ravikiran K, Neerav Nishant, M Sreedhar, N.Kavitha, Mathur N Kathiravan, Geetha A, Deep learning methods and integrated digital image processing techniques for detecting and evaluating wheat stripe rust disease , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Syed Amin Jameel, Abdul Rahim Mohamed Shanavas, Deep-Ultranet: Diabetic Retinopathy Grading System Using Ultra-Widefield Retinal Images , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Deepa Ramachandran VR VR, Kamalraj N, Hybrid deep segmentation architecture using dual attention U-Net and Mask-RCNN for accurate detection of pests, diseases, and weeds in crops , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- P. S. Dheepika, V. Umadevi, An optimized approach for detection and mitigation of DDoS attack cloud using an ensembled deep learning approach , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- A. Basheer Ahamed, M. Mohamed Surputheen, M. Rajakumar, Quantitative transfer learning- based students sports interest prediction using deep spectral multi-perceptron neural network , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

