Claim Missing Document
Check
Articles

Found 2 Documents
Search

Cryptographic algorithm optimization for defense data security using quantum inspired algorithms Bagus Hendra Saputra; Jonson Manurung; Jeremia Paskah Sinaga
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid advancement of quantum computing poses a critical threat to classical public-key cryptographic systems widely used in defense communication infrastructures, while the practical deployment of post-quantum cryptography (PQC) remains constrained by excessive key sizes, computational overhead, and energy consumption in bandwidth- and latency-sensitive military environments. This study aims to develop and evaluate a quantum-inspired multi-objective optimization framework to enhance the operational feasibility of standardized PQC schemes without compromising cryptographic security. The proposed method applies a Quantum Genetic Algorithm (QGA) to optimize configuration parameters of CRYSTALS-Kyber and CRYSTALS-Dilithium by simultaneously balancing security strength, computational performance, resource efficiency, and deployability. Experiments were conducted using official NIST test vectors and defense-oriented communication scenarios, with performance evaluated across encryption and signature latency, throughput, key and signature sizes, memory footprint, and energy consumption, while security was validated against classical and quantum attack models. The results demonstrate that the optimized configurations achieve key and signature size reductions of up to 10.3%, throughput improvements of up to 15.5%, and energy consumption reductions of up to 12.5% compared to baseline NIST implementations, while fully maintaining NIST security levels and robust resistance to quantum adversaries. These improvements significantly enhance the suitability of PQC for tactical radios, satellite communications, and resource-constrained defense platforms. The findings indicate that quantum-inspired multi-objective optimization is a critical enabler for transitioning post-quantum cryptography from theoretical security constructs to deployable, mission-ready solutions in real-world defense systems.
Security threat prediction model using graph neural networks and deep temporal learning Eryan Ahmad Firdaus; Adam Mardamsyah; Jeremia Paskah Sinaga
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The increasing complexity and interconnectedness of modern security threats, including terrorism, social unrest, and transnational conflicts, pose significant challenges for traditional intelligence and threat detection systems, which struggle to capture both relational and temporal dynamics of evolving security environments. This study aims to develop a predictive framework capable of providing early warnings of emerging security threats by integrating graph-based relational modeling with temporal sequence learning. We propose a hybrid architecture combining Graph Neural Networks (GNN) with bidirectional Long Short-Term Memory (LSTM) networks, enhanced with an attention-based fusion mechanism to jointly model actor interactions and temporal evolution. The framework leverages large-scale event data from GDELT and ACLED spanning 2015–2025, encompassing over 9.8 million events and 14,532 unique actors, and constructs dynamic, attributed security networks to capture multi-dimensional actor relationships. Experimental results demonstrate that the proposed GNN-LSTM model achieves an overall accuracy of 94.3% and an F1-score of 88.3% for critical threat detection, outperforming traditional machine learning baselines and providing early warnings up to nine days in advance. The model also offers interpretability by highlighting influential actors and key relational patterns contributing to threat escalation. These findings suggest that integrating relational and temporal information through hybrid deep learning architectures significantly enhances predictive accuracy and operational utility in security threat assessment, offering a practical tool for proactive decision-making and resource allocation in complex security environments.