ISSN: 2582-8266 (Online) || ISSN Approved Journal || Google Scholar Indexed || Impact Factor: 9.48 || Crossref DOI
Designing a zero-trust post-quantum encryption framework for adaptive end-to-end network security in dynamic threat environments
1 Department of Informatics, Fort Hays State University, Hays, Kansas, USA.
2 Department of Information Technology, University of Cumberlands, Kentucky, USA.
3 Department of Computer Science, University of Nigeria, Nsukka
4 NHS Derby and Derbyshire ICB, United Kingdom.
Research Article
World Journal of Advanced Engineering Technology and Sciences, 2024, 13(02), 934-948.
Article DOI: 10.30574/wjaets.2024.13.2.0629
Publication history:
Received on 07 October 2024; revised on 14 November 2024; accepted on 26 November 2024
Abstract:
The advent of quantum computing poses a fundamental threat to classical encryption protocols, demanding urgent transformation in cybersecurity architectures. This study presents a U.S.-focused Zero-Trust Enabled Post-Quantum Encryption Framework (ZT-PQEF) designed to deliver adaptive end-to-end network security in dynamic threat environments. ZT-PQEF integrates NIST-standard post-quantum cryptographic algorithms (CRYSTALS-Kyber and Dilithium) with behavior-informed trust scoring, real-time key rotation, and telemetry-driven microsegmentation. A U.S. federal network simulation was used to benchmark the framework across nine performance metrics and seven critical system dimensions. Compared to conventional zero-trust and static PQC-enabled architectures, ZT-PQEF achieved a 22% improvement in cryptographic agility, reduced breach containment time by over 40%, and significantly lowered false-positive rates in behavioral anomaly detection. The framework preserved bandwidth viability and minimized resource overhead, confirming its suitability for high-throughput, resource-sensitive government deployments. These results demonstrate that ZT-PQEF delivers scalable, quantum-resilient, and policy-adaptive security, representing a critical advancement in post-quantum infrastructure protection and future-proof zero-trust implementation across the United States.
Keywords:
Post-Quantum Cryptography; Zero Trust Architecture; Adaptive Network Security; Quantum-Resilient Encryption; Trust Scoring; Key Rotation; Behavioral Anomaly Detection; U.S. Cybersecurity; Dynamic Threat Environments; CRYSTALS-Kyber; CRYSTALS-Dilithium
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0