Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Phys.

Sec. Quantum Engineering and Technology

This article is part of the Research TopicNext-Generation Security for Critical Infrastructures: Advancing Privacy, Resilience, and Post-Quantum ProtectionView all articles

Design and Implementation of an Authenticated Post-quantum Session Protocol Using ML-KEM(Kyber), ML-DSA(Dilithium), and AES-256-GCM

Provisionally accepted
  • School of Computer Science and Engineering, VIT, Vellore, India

The final, formatted version of the article will be published soon.

Session establishment,the process by which two parties authenticate each other and derive a shared secret key,forms the foundation for secure digital communication. Quantum computers threaten this foundation by breaking classical public-key primitives, such as RSA and elliptic-curve Diffie–Hellman, thereby enabling harvest-now–decrypt-later (HNDL) attacks that endanger long-term confidentiality. This paper presents the design, implementation, and evaluation of an authenticated, quantum-resistant session protocol that replaces these vulnerable mechanisms with their post-quantum counterparts. The proposed protocol integrates ML–KEM–1024 (FIPS 203; CRYSTALS, Kyber) for ephemeral key exchange, ML–DSA-65 (FIPS 204; CRYSTALS, Dilithium) for endpoint authentication, and AES–256–GCM for symmetric protection. A transcript-bound HKDF–SHA3-256 key schedule and a 96-bit GCM nonce construction with conservative rekey limits are used to ensure forward secrecy, downgrade resistance, and message integrity.A Python/C prototype (PQClean ML–KEM–1024 with PyCryptodome AES–256–GCM) was benchmarked over 1,000 iterations on commodity hardware. The results show that sub-millisecond cryptographic overhead ML–KEM–1024 matches the performance of X25519 while vastly outperforming RSA–3072 in secure session establishment, and symmetric encryption remains cost-effective. Nonces are unique 96-bit values, never reused across directions or beyond 232 records, following NIST SP 800–38D; when nonce-misuse resistance is required, AES–256–GCM–SIV (RFC 8452) is supported as a drop-in alternative. Empirical tests under both local and WAN-emulated (≈40 ms RTT) network conditions confirm that the additional post-quantum cost maintains the handshake cryptographic latency in the 0.50– 0.70 ms, demonstrating that fully authenticated, forward-secure, quantum-resistant session negotiation is practical for real-world deployments.

Keywords: post-quantum cryptography (PQC), ML-KEM (Kyber, FIPS 203), ML-DSA (Dilithium, FIPS 204), AES-256-GCM, Authenticated Quantum-Resistant Key Exchange, Harvest-Now-Decrypt-Later (HNDL)

Received: 13 Oct 2025; Accepted: 17 Nov 2025.

Copyright: © 2025 S P and Akinlemi. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Meenakshi S P, spmeenakshi@vit.ac.in

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.