Published on 00/00/0000
Last updated on 00/00/0000
Published on 00/00/0000
Last updated on 00/00/0000
Share
Share
QUANTUM
4 min read
Share
Post-quantum cryptographic (PQC) algorithms are designed to defend against quantum attacks. Their advanced security exhibits unique runtime characteristics due to their computational intensity and memory requirements.
Our study, Fingerprinting implementations of cryptographic primitivies and protocols that use post-quantum algorithms, shows that these features make PQC implementations identifiable, or able to be fingerprinted, through side-channel analysis. Across libraries and secure protocols, machine learning (ML) models achieve up to 100% accuracy in classifying PQC schemes, revealing a new class of threats.
Fingerprinting is not merely theoretical: It has been integrated into Cisco’s risk analysis platform and used to identify PQC connections across the internet.
Post-quantum cryptography offers resistance against quantum attacks but introduces implementation level side channels due to unique computational resource consumption. This work raises the question: Can attackers or analysts identify which PQC algorithms, libraries, or protocols are being used, regardless of cryptographic strength? Our research explores the possibility in real-world threat scenarios, from local system access (e.g., in a multi-tenant cloud) to network visibility (e.g., handshake capture).
Assuming the mathematical security of PQC schemes, their implementations are often characterized by large key sizes, complex internal structures, and elevated computational overhead.
These resource patterns are observable and consistent enough to allow fingerprinting. The distinctiveness of these patterns, especially in early PQC deployments, creates an opportunity for both attackers and security analysts. For example, an adversary might exploit this to detect PQC adoption, launch downgrade attacks, or profile vulnerable deployments.
The study evaluates the ability to fingerprint at two levels: implementations and protocols.
Fingerprinting methods are integrated into Cisco’s post-network threat analyzer. It includes classifiers for PQC usage in TLS, as well as tools to analyze runtime behavior of cryptographic libraries.
In a scan of one million domains from the Tranco list, the system identified nearly 5,000 IPs likely using PQC key exchange, primarily associated with major cloud and CDN providers such as Cloudflare, Google, Microsoft, and Amazon. This indicates that early PQC adoption is concentrated within large-scale infrastructure.
Fingerprinting challenges the assumption that secure algorithms imply secure deployments. The ability to infer cryptographic usage passively introduces risks of selective targeting and surveillance. Defenses include memory randomization, encrypted handshakes (e.g., TLS Encrypted Client Hello), and OS-level protections on process telemetry. However, these are either incomplete or impose performance trade-offs.
Our research reveals that PQC schemes have a high ability to be fingerprinted via their runtime and network characteristics. High classification accuracy across libraries, protocols, and platforms confirms that side-channel observables expose meaningful cryptographic metadata. As PQC adoption accelerates, eliminating these side channels is crucial for preserving not just security, but operational privacy.
If you’re interested in Cisco’s ongoing research on post-quantum cryptography and related quantum computing and security topics, explore more of our published work on the Cisco Research website.
For a more detailed dive into the data and findings, read the full study: Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms.
Get emerging insights on innovative technology straight to your inbox.
Explore the detailed design of Cisco’s Quantum Random Number Generator (QRNG) which leverages quantum vacuum noise to ensure true randomness.
* No email required
The Shift is Outshift’s exclusive newsletter.
Get the latest news and updates on agentic AI, quantum, next-gen infra, and other groundbreaking innovations shaping the future of technology straight to your inbox.