A Post-Quantum Cryptography Framework for Securing Banking Communications in Iraq

Authors

  • Haroon Rashid Hammood Al Dallal Technical Institute of Najaf, Al-Furat Al-Awsat Technical University (Atu), Najaf, Iraq

Keywords:

private banks

Abstract

Iraq’s banking sector has grown very fast in recent years, with over 18.5 million bank cards and electronic payments above 2 trillion IQD each month by 2023. While this growth improves financial access but it also increases exposure to cyber threats, which are rising worldwide. Iraq’s system of seven state owned and more than sixty private banks shows uneven cyber readiness, with private banks facing greater challenges. In addition, quantum computing threatens existing encryption methods like RSA and ECC. This paper analyzes Iraq’s banking cyber risks and proposes a post-quantum cryptography (PQC) model to strengthen security, support both public and private banks, and prepare for future quantum-safe standards.

References

Central Bank of Iraq, Banking Sector Statistics (2023 Sector Composition). Baghdad: CBI, 2024.

Central Bank of Iraq, CBI Annual Statistical Bulletin 2023. Baghdad: CBI, 2023.

Central Bank of Iraq, CBI Strategy 2024–2026. Baghdad: CBI, 2024.

Jummar Media, “Shaimaa and Muhammad’s concerns about digital payment,” Apr. 3, 2025.

FintechNews Middle East, “Iraq introduces new regulations to modernize payments and banking,” Oct. 1, 2024.

Reuters, “U.S. Treasury official says Iraq must act to avoid further action on banks,” Sep. 14, 2023.

World Bank, Iraqi Banking Sector Market Structure (December 2019). Washington, DC: World Bank, 2019.

International Monetary Fund, Global Financial Stability Report: Cyber Risk in the Financial Sector (Online Annex to Chapter 3). Washington, DC: IMF, Apr. 2024.

Cybil Portal, “Iraq Cyber Events Response Team (IQ-CERT),” 2025.

Resecurity, “Resecurity partners with Iraq Cyber Events Response Team (IQ-CERT),” Business Wire, Jul. 23, 2025.

P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124–134.

D. J. Bernstein and T. Lange, “Post-quantum cryptography,” Nature, vol. 549, no. 7671, pp. 188–194, 2017.

C. Peikert, “A decade of lattice cryptography,” Foundations and Trends in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2016.

R. Overbeck and N. Sendrier, “Code-based cryptography,” in Post-Quantum Cryptography,

J. Bernstein, J. Buchmann, and E. Dahmen, Eds. Berlin: Springer, 2009, pp. 95–145.

A. Hülsing, D. Butin, S. Gazdag, J. Rijneveld, and A. Mohaisen, “XMSS: eXtended Merkle signature scheme,” RFC 8391, IETF, May 2018.

National Institute of Standards and Technology, Post-Quantum Cryptography Standardization: Finalist Algorithms Overview. Gaithersburg, MD: NIST, 2023.

J. Bos et al., “CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM,” in 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 2018, pp. 353–367.

Downloads

Published

2026-01-04

How to Cite

Al Dallal, H. R. H. (2026). A Post-Quantum Cryptography Framework for Securing Banking Communications in Iraq. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(1), 227–233. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/860

Issue

Section

Articles