Secure Quantum-Enhanced Cryptographic Architecture using Optimized Tabula Recta for Cipher Text Hardening
Secure Quantum-Enhanced Cryptographic Architecture using Optimized Tabula Recta for Cipher Text Hardening |
||
![]() |
![]() |
|
© 2025 by IJETT Journal | ||
Volume-73 Issue-9 |
||
Year of Publication : 2025 | ||
Author : Syed Usman Basha, S. Brintha Rajakumari | ||
DOI : 10.14445/22315381/IJETT-V73I9P128 |
How to Cite?
Syed Usman Basha, S. Brintha Rajakumari,"Secure Quantum-Enhanced Cryptographic Architecture using Optimized Tabula Recta for Cipher Text Hardening", International Journal of Engineering Trends and Technology, vol. 73, no. 9, pp.328-341, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I9P128
Abstract
In the era of quantum computing, existing cryptographic systems are increasingly vulnerable to quantum-based attacks, necessitating the development of robust encryption architectures. This research proposes a secure quantum-enhanced cryptographic architecture using optimized tabula recta for cipher text hardening, fuses classical polyalphabetic substitution with quantum randomness to reinforce data confidentiality. The key issue addressed is the susceptibility of legacy encryption schemes, particularly those based on deterministic keys, to quantum algorithms such as Shor’s and Grover’s, which can compromise data integrity and confidentiality in seconds. To resolve this, introduce a hybrid encryption framework that optimizes the classical Tabula Recta Cipher (TRC) using quantum-generated keys to dynamically alter substitution patterns, thereby achieving non-repetitive and high-entropy ciphertext structures. The methodology incorporates a Quantum Random Number Generator (QRNG) to produce non-deterministic seed values, enhancing unpredictability, while an optimized Tabula Recta grid enables efficient yet secure symbol substitution. The primary objective is to provide a lightweight, scalable, and quantum-resilient encryption mechanism suitable for secure communications across cloud, IoT, and edge platforms. Experimental evaluations demonstrate significant improvements in entropy, diffusion, and resistance to brute-force and frequency analysis attacks compared to existing schemes. The results confirm that the proposed architecture offers a viable post-quantum cryptographic solution with enhanced ciphertext complexity and minimal computational overhead.
Keywords
Quantum Cryptography, Tabula Recta, Ciphertext Hardening, Post-Quantum Security, Quantum Random Number Generator (QRNG), Hybrid Encryption, Polyalphabetic Cipher, Data Confidentiality, Cryptographic Entropy, Secure Communication.
References
[1] Shreya Savadatti et al., “Analysis of Quantum Fully Homomorphic Encryption Schemes (QFHE) and Hierarchial Memory Management for QFHE,” Complex & Intelligent Systems, vol. 11, no. 6, pp. 1-28, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Adhavan Arumugam et al., “Quantum-Integrated Steganography for Secure Communication using QKD and LSB Techniques,” 2025 International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India, pp. 977-983, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Rashmi Singh, Ruchira Singla, and Amir Abdelwahed, Mathematics and Statistics in Quantum Computing: Advancing Cybersecurity for Modern Supply Chains, Quantum Computing and Artificial Intelligence in Logistics and Supply Chain Management, 1st ed., Chapman and Hall/CRC, pp. 368-396, 2025.
[Google Scholar] [Publisher Link]
[4] Umer Nauman et al., “Q-ECS: Quantum-Enhanced Cloud Security with Attribute-Based Cryptography and Quantum Key Distribution,” Quantum Information Processing, vol. 24, no. 6, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ruli Supriati et al., “Enhancing Network Security with Quantum Cryptography: A Study on Future-Proofing Computer Networks AgainstQuantum Attacks,” Journal of Computer Science and Technology Application, vol. 2, no. 1, pp. 24-35, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Meenal R. Kale et al., “Designing Quantum-Resilient Blockchain Frameworks: Enhancing Transactional Security with Quantum Algorithms in Decentralized Ledgers,” International Journal of Advanced Computer Science and Applications, vol. 16, no. 4, pp. 618-628, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[7] T. P. Latchoumi et al., “A Framework for Low Energy Application Devices using Blockchain-Enabled IoT in WSNS,” Integrating Blockchain and Artificial Intelligence for Industry 4.0 Innovations, Springer International Publishing, pp. 121-132, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Devulapally Swetha, and Shaik Khaja Mohiddin, “Elevating Quantum-Enhanced Security: Pioneering Advances for Cloud Computing Environments,” 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN), Bidar, India, pp. 1-6, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Archana Kotangale, Meesala Sudhir Kumar, and Amol P. Bhagat, “Improved Big Data Security using Quantum Chaotic Map of Key Sequence,” Computers, vol. 14, no. 6, pp. 1-29, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Umer Riaz, and Mark Vandenbosch, “Quantum-Resistant Cryptography in Zero Trust Architecture: A Necessary Change in Cloud Computing,” Authorea Preprints, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Albert Nieto Morales, Arit Kumar Bishwas, and Joel Jacob Varghese, “Quantum-Enabled Framework for the Advanced Encryption Standard in the Post-Quantum Era,” arXiv preprint, pp. 1-28, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mina Alipour, “QIoT: IoT Architectures in Quantum Computing Era,” 2025 IEEE 22nd International Conference on Software Architecture Companion (ICSA-C), Odense, Denmark, pp. 241-250, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Hina Jameel, and Javid Iqbal, “Cybersecurity in Motion: Quantum-Enhanced SOC Strategies for AI-Powered Threats in Self-Driving Vehicles and IoT-Enabled Smart Cities,” pp. 1-6, 2025.
[Google Scholar]
[14] Ravi Bishnoi, and Jennifer Pomeroy, “AI and Quantum Computing: Transforming Information Security Protocols for the Future,” pp. 1-8, 2025.
[Google Scholar]
[15] Ankita Sharma, and Shalli Rani, “Post-Quantum Cryptography (PQC) for IoT-Consumer Electronics Devices integrated with Deep Learning,” IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 4925-4933, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Nagababu Garigipati, S. Srithar, and V. Krishna reddy, “An Efficient Poly-Quantum Integrity Key Generation Based Multi-User Access Control Encryption and Decryption Framework for Homogeneous and Heterogeneous Cloud EHR Databases,” Information Security Journal: A Global Perspective, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[17] R. Ramya et al., “A Review of Quantum Communication and Information Networks with Advanced Cryptographic Applications using Machine Learning, Deep Learning Techniques,” Franklin Open, vol. 10, pp. 1-12, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Tanvir H. Sardar et al., “Integrating Blockchain and Quantum Key Exchange with Deep Learning for Enhanced Medical Data,” Procedia Computer Science, vol. 259, pp. 1208-1217, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Salam Al E'mari et al., Quantum Computing Implications in Generative AI Cybersecurity, Examining Cybersecurity Risks Produced by Generative AI, IGI Global Scientific Publishing, pp. 609-642, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Aakar Mathur, Ashish Gupta, and Sajal K. Das, “When Federated Learning Meets Quantum Computing: Survey and Research Opportunities,” arXiv Preprint, pp. 1-25, 2025.
[CrossRef] [Google Scholar] [Publisher Link]