Next Article in Journal
CALM: Curriculum Anatomy-Guided Learning Method with Population Template Priors for Source-Free Cross-Modality Prostate MRI Segmentation
Previous Article in Journal
A Network Intrusion Detection System Based on VAE-CWGAN and Feature Selection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Antagonistic Differential Game of Critical Infrastructure Migration Management to Post-Quantum Cryptography Under HNDL Conditions

by
Feruza Malikova
1,2,
Valery Lakhno
1,3,
Zhuldyz Alimseitova
2,*,
Myroslav Lakhno
3,
Kuljan Togzhanova
1 and
Gulzhanat Beketova
1,4
1
Faculty of Information Technologies, Almaty Technological University, Almaty 050012, Kazakhstan
2
Institute of Automation and Information Technologies, Satbayev University, Almaty 050013, Kazakhstan
3
Department of Computer Systems, Networks and Cybersecurity, National University of Life and Environmental Sciences of Ukraine, 03041 Kyiv, Ukraine
4
Institute of Information Technology, Almaty University of Energy and Communications Named After G. Daukeyev, Almaty 050013, Kazakhstan
*
Author to whom correspondence should be addressed.
Information 2026, 17(5), 485; https://doi.org/10.3390/info17050485 (registering DOI)
Submission received: 25 March 2026 / Revised: 4 May 2026 / Accepted: 13 May 2026 / Published: 15 May 2026

Abstract

Advances in quantum computing have created a serious threat to modern asymmetric cryptosystems protecting heterogeneous critical information infrastructures (CIIs). During this transition period, the primary threat is the “Harvest Now, Decrypt Later” (HNDL) temporal strategy of attackers, which requires the forced migration of CIIs to post-quantum cryptography (PQC) algorithms. However, such migration is associated with nonlinear “technological friction.” This will manifest as a drop in the performance of legacy systems, such as SCADA. In the context of deep cross-industry integration, this can trigger avalanche-like cascading CII failures. This article presents a model of a zero-sum differential game between a CII defender and an attacker (APT group). Using Pontryagin’s maximum principle and the Forward–Backward Sweep Method (FBSM) iterative algorithm, a saddle point was found that determines the equilibrium trajectories of limited resource allocation over a given planning horizon for the CII transition to PQC. The results of the computational experiment demonstrated that isolated sectoral migration is ineffective. It is shown that optimal control requires cross-sector synchronization to prevent cascading degradation of the CII. The proposed mathematical framework provides a practical toolkit for strategic IT budget planning and national security risk management in anticipation of quantum supremacy (Q-Day).

1. Introduction

In developed countries, critical information infrastructures (CIIs), including energy systems, financial networks, transportation, communications, and government services, ensure the resilience and security of government and society. Advances in quantum computing technologies have created a new threat landscape for CIIs. The approach of “Q-Day,” the moment when quantum supremacy sufficient to implement Shor’s algorithm and crack modern asymmetric cryptosystems is achieved, has transformed the threat of global data compromise from hypothetical to practically inevitable [1]. The “Harvest Now Decrypt Later” (HNDL) [2] temporal strategy, used by the cyberattackers on CIIs, has found its niche during the transition period. Within this paradigm, attackers, primarily APT groups [3,4], carry out preemptive interception and accumulation of encrypted traffic for subsequent retrospective decoding after hardware implementation of a full-scale quantum computer.
Protecting CII from HNDL attacks requires accelerated migration to post-quantum cryptography (PQC) algorithms [5]. However, the process of implementing PQC in distributed heterogeneous CII networks will not happen overnight. It is associated with significant “technological friction.” This friction consists essentially of a temporary reduction in the operational stability of legacy equipment, such as legacy SCADA systems—which are typical in many post-Soviet countries—degradation of communication channel capacity, and the risk of cascading failures in interdependent CII sectors. For the Republic of Kazakhstan (RK), this problem has acquired strategic significance. Kazakhstan’s economy depends on the smooth functioning of the energy and mining sectors, where legacy industrial controllers and SCADA systems have historically been highly prevalent. Given the accelerated pace of digitalization of public administration and the integration of financial services into a single system, Kazakhstan’s heterogeneous infrastructure is becoming an extremely vulnerable target for APT groups. Therefore, a preventive assessment of the risks of HNDL attacks and the development of a scientifically based migration plan to PQC is a matter of national security.
It is worth noting that the modern economy relies on the deep integration of critical infrastructures. Financial transactions are inextricably linked to telecommunications, and transportation and logistics networks are critically dependent on uninterrupted power supplies. Implementing computationally intensive PQC algorithms in a single sector will inevitably increase local processor load and increase traffic processing latency. In the context of tight cross-industry interconnections, such localized “technological friction” could potentially trigger a domino effect. That is, a situation could arise where a resource shortage in one node leads to an avalanche-like degradation and cascading failures of related government and economic services. The mathematical model presented in this paper is based on the concept of a confrontation between two intelligent agents—a CII defender and an attacker. This poses an optimization problem for allocating limited resources in the face of active countermeasures. The defender seeks to minimize systemic damage and the costs of forced implementation of CII protection. At the same time, the attacker seeks to maximize CII losses while minimizing its own costs on interception infrastructure. The dynamics of this conflict unfold on a directed graph of interdependent CII nodes. This article examines the interaction between the parties as a zero-sum differential game over a given planning horizon for the CII transition to PQC. The aim of the study is to synthesize optimal controls for both sides of the conflict that form a saddle point, which will allow the development of strategies for CII migration to PQC, taking into account the risk of cascading failures and limitations on computing resources.

2. Statement of the Problem

The challenge of protecting CII from quantum threats boils down to resolving the fundamental contradiction between the requirements of cryptographic security and operational resilience in heterogeneous networks. The temporal HNDL strategy implemented by APT groups requires the defender to deploy PQC algorithms as quickly as possible before the moment of quantum supremacy (i.e., Q-Day). Forced migration to computationally intensive PQC algorithms will cause “technological friction,” in other words, overloading legacy equipment, such as SCADA systems, and degrading communication channels. Due to the deep integration of CII sectors (finance, telecommunications, energy, etc.), a local resource shortage during an upgrade of one node can trigger a domino effect and cascading failures of related services. Consequently, a conflict arises under resource constraints. The defender must find a time-optimal resource allocation strategy for migrating nodes to PQC, minimizing both the accumulation of intercepted data by the attacker and the risk of its own cascading failures. In turn, the attacker adjusts the intensity of traffic interception, maximizing damage to the CII while minimizing its own costs.
Ultimately, the scientific problem consists of finding equilibrium strategies in an antagonistic differential zero-sum game that will allow managing the process of CII migration to PQC, taking into account the nonlinear dynamics of cascading failures and enemy activity over the entire planning horizon. It should be noted that the covert phase of traffic interception in the HNDL paradigm is not completely “invisible.” During the process of unauthorized data accumulation, the attacker inevitably generates specific digital traces—compromised access nodes, routing anomalies, etc. The current mathematical formulation abstracts from the stochastic nature of the detection of these artifacts. However, the integration of additional costs for threat hunting, i.e., proactive search for digital traces, into the defender’s functionality creates a promising vector for expanding the proposed game–theoretic apparatus in future research.

3. Review of Previous Research

Developing effective CII protection strategies in the context of the transition to PQC requires interdisciplinary analysis. An analysis of relevant research in recent years has allowed identifying several priority research areas that ultimately form the theoretical basis for this work.
Thus, the classical apparatus of multi-stage games is unable to satisfy the requirements for continuity and efficiency in the analysis of network attacks and CII protection [6]. To overcome these limitations, researchers are increasingly turning to differential game theory, which allows describing the processes of cybernetic confrontation over time [7]. Zero-sum differential game models have been successfully used by the authors [8] to analyze competition for limited network resources in the Industrial Internet of Things (PIoT), to develop optimal control strategies for FDI attacks and to assess the reliability of large-scale systems through the allocation of protective resources [9]. In particular, the works [10,11] proved the applicability of differential games for modeling variable strategies of cryptographic systems under quantum threats.
The advent of quantum computing has created a fundamental threat to modern asymmetric cryptosystems protecting CIIs. Researchers have noted that HNDL attacks target long-lived information, primarily intellectual property, financial data, and government secrets. The HNDL strategy poses a long-term hidden threat, as the “harvesting” phase can occur undetected and last for years [12,13].
The only reliable method of protecting against HNDL attacks is early migration to PQC. However, the implementation of standardized algorithms, such as Kyber [14] or Dilithium [15], is associated with significant technological friction. PQC algorithms require more memory, longer keys, and are characterized by high computational costs, which creates critical delays [16,17]. This problem is particularly acute for legacy industrial automation (SCADA) and operational technology (OT) systems [18], where existing standards such as AGA-12 have already been recognized as vulnerable [19]. Experts emphasize that PQC migration is not simply a software update, but a systemic transformation that requires synchronization of the entire system to prevent failures in resource-intensive nodes [20,21].
It should be noted that modern CIIs operate as deeply integrated, i.e., heterogeneous networks [22]. A failure in a single node can trigger a domino effect [23]. Redistribution of traffic or computing load in such networks leads to equipment overloads and cascading failures, threatening the entire system. Higher-order networks [24], high-level architecture (HLA) co-simulation methods [25], Markov chains [26], and dynamic recovery time prediction [27] are used to analyze these nonlinear processes. The studies analyzed have shown that even minor initial disturbances, such as a local shortage of processor time, can lead to a full-scale system collapse [28].
Despite the separate study of each area, the scientific literature lacks a mathematical framework that combines the temporal dynamics of the HNDL strategy, nonlinear “technological friction” during the forced implementation of PQC, and the risk of cascading failures into a single optimization problem. This paper aims to fill this gap by proposing a model of a zero-sum differential game that ultimately allows finding a saddle point and develops an optimal resource allocation strategy for the CII defender during the transition period of CIIs to PQC.

4. Methods and Models

The mathematical model is based on the concept of a confrontation between two intelligent agents. The first is the defender of the critical infrastructure. The second is the attacker. The confrontation takes place on a directed graph of the critical information infrastructure (CII). The graph consists of interdependent nodes.
Let us define the phase space of the system X t R 2 N . For each node i 1 , , N let introduce two state variables: S i t 0 , K i is the level of operational stability of the i -th sector, where K i is design (i.e., ideal) throughput and H i t 0 is the amount of sensitive data accumulated by the adversary as part of the HNDL temporal strategy.
Within the framework of the model, we control the system through two vectors of influences:
u i t 0 , u m a x is the defender control that determines the intensity of migration of the i-th node to PQC algorithms.
v i t 0 , v m a x is the attacker control, determining the intensity of the allocation of computing and network resources by the APT group for the targeted interception of traffic in the i -th sector.
We will describe the dynamics of changes in the state of CII using a system of nonlinear differential equations (NDE):
d S i d t = α i S i 1 S i K i j = 1 N w i j Θ ~ K j c r i t S j μ i S i u i θ i Ω i H i 1 u i Ψ τ ,
d H i d t = β i v i t S i 1 u i γ i u i H i .
To close the mathematical model, system (1), (2) is supplemented with a vector of initial conditions at time t = 0 : S i 0 = S i , 0 , H i 0 = H i , 0 i 1 , , N . In light of the subject area under study, the initial state S i , 0 0 , K i reflects the level of operational readiness of the i -th node before the start of the active phase of PQC implementation, and H i , 0 0 characterizes the existing, i.e., basic volume of compromised data at the start of the simulation, in the particular case of ideal initial isolation H i , 0 = 0 .
We emphasize that the choice of phenomenological functions in the system of differential Equations (1) and (2) in this study is based on empirical characteristics of the functioning of heterogeneous networks. It is also worth noting that the nonlinear term describing “technological friction” approximates the benchmarking results of candidate PQC algorithms. These are the aforementioned CRYSTALS-Kyber and Dilithium. Practical tests [14,15] have shown that as the share of protected traffic approaches 100%, the overuse of RAM and CPU time in controllers increases nonlinearly. In turn, replacing the discontinuous Heaviside function with a smooth sigmoid function for modeling cascading failures will not only ensure the required continuous differentiability for applying Pontryagin’s maximum principle but also physically reflect the inertia of the degradation of dependent network nodes. This conclusion is directly consistent with percolation and failure propagation models, in contrast to the assumption of instantaneous link failure.
The components of Equations (1) and (2) have the following meaning. The first term in Equation (1) d S i / d t describes the logistic self-healing of the system with a resilience coefficient α i . The second term models the cascading degradation of CII. To ensure model differentiability, the discontinuous Heaviside activation function is replaced with a smooth sigmoid activation function Θ ~ x = 1 1 + e k x , where the parameter k 1 specifies the steepness of the decline. The term μ i S i u i θ i in (1) reflects “technological friction.” This parameter assumes a nonlinear decline in the performance of legacy CII equipment with the forced implementation of PQC, i.e., θ i > 1 . The last term in (1) describes the instantaneous damage at the moment of quantum supremacy, i.e., Q-Day, where Ψ τ is the activation function of the quantum threat, and Ω i is data criticality. The variable τ denotes the chronological time of the development of quantum technologies, synchronized with the modeling variable t . It is assumed that Ψ τ = 1 1 + e ν τ τ Q , where τ Q is expected moment of achieving cryptographically relevant quantum superiority, and the parameter ν specifies the steepness of the transition from the classical era to the era of quantum hacking. The multiplier 1 u i implies that the destructive effect of decrypted data can only be realized in those CII segments that are not yet protected by post-quantum protocols at time τ Q .
Equation (2) for d H i / d t shows that the rate of accumulation of data by the adversary is proportional to the volume of traffic S i , the intensity of the attack v i , and the share of vulnerable channels 1 u i , while the rotation of post-quantum keys u i and the natural obsolescence of information γ i will lead to the depreciation of the accumulated base.
Note that the logistic growth in Equation (1) describes the natural recovery of the system. The nonlinear term μ i S i u i θ i formalizes the concept of “technological friction.” For the purposes of this study, technological friction is quantified as the cumulative throughput loss of a CII node. This loss is caused by computational overhead, increased network latency, and the need for packet fragmentation when implementing PQC, for example, when switching from classical algorithms to CRYSTALS-Kyber. The exponent θ i > 1 reflects the empirical assumption that as the share of protected PQC traffic approaches 100%, the load on legacy controllers increases exponentially due to the nonlinear exhaustion of memory buffers and processor time. This formalization allowed taking into account the specifics of hardware limitations without going into micromodeling of individual CII network nodes.
We note that the choice of phenomenological functions in the system of differential equations is determined by the empirical characteristics of heterogeneous networks. The logistic recovery term α i S i 1 S i K i reflects the standard dynamics of IT service regeneration limited by network capacity. The specific form of “technological friction,” defined as μ i S i u i θ i , approximates the benchmark results of NIST PQC candidate algorithms, in particular, CRYSTALS-Kyber and Dilithium. Empirical data showed that as the proportion of protected traffic u i approaches 100%, the memory and CPU overhead of legacy SCADA systems increases nonlinearly ( θ i > 1 ) due to the exhaustion of hardware buffers. The Q-Day threat activation moment is modeled by a smooth sigmoid function rather than a stepwise jump. This mathematically reflects the probabilistic nature of achieving quantum supremacy and ensures continuous differentiability of the system for the correct operation of the forward–backward sequence model (FBSM).
We will consider the interaction between the parties as a zero-sum, antagonistic differential game. The parties pursue directly opposing goals over a given planning horizon T .
The defender seeks to minimize systemic damage and the costs of forced security implementation. At the same time, the attacker seeks to maximize CII losses while minimizing its own interception infrastructure costs. The integrated payment functionality J u , v will take the following form:
J ( u , v ) = 0 T i = 1 N Q i ( K i S i ) 2 + 1 2 R u i u i 2 1 2 R v i v i 2 d t + i = 1 N 1 2 F i ( K i S i T ) 2 .  
In (3) Q i is the weighting coefficient of the strategic importance of the CII sector. Parameters R u i and R v i are the specific costs of the defender and attacker resources, respectively. The multipliers 1 / 2 are introduced for the mathematical convenience of subsequent differentiation. The terminal term F i penalizes the defender for the unacceptable state of the CII at the end of the planning horizon T .
The goal of solving the problem is to find such optimal strategies u * t and v * t , that form a saddle point:
J u * , v J u * , v * J u , v * .
For the analytical search for optimal controls, we apply Pontryagin’s maximum principle. We introduce vectors of conjugate variables λ i t and η i t , which have the economic meaning of “shadow prices”—they show the marginal change in the objective functional for a small perturbation of operational stability and the volume of intercepted data, respectively.
Let us compose the Hamilton–Pontryagin function for our system:
H = i = 1 N Q i ( K i S i ) 2 + 1 2 R u i u i 2 1 2 R v i v i 2 + i = 1 N λ i S ˙ i + i = 1 N η i H ˙ i
Expanding the expressions for the derivatives, we obtain the complete Hamiltonian:
H = i = 1 N [ Q i ( K i S i ) 2 + 1 2 R u i u i 2 1 2 R v i v i 2 + λ i ( α i S i 1 S i K i j = 1 N w i j Θ ~ j μ i S i u i θ i Ω i H i 1 u i Ψ τ ) + η i β i v i S i 1 u i γ i u i H i ] .
According to the saddle point conditions, the optimal control of the defender must minimize the Hamiltonian H u i = 0 . And the attacker’s control must maximize the Hamiltonian H v i = 0 . To analytically confirm the existence of a saddle point, we check the fulfillment of local conditions of strict convexity–concavity of the Hamilton–Pontryagin function. The second derivative with respect to the control of the attacker 2 H v i 2 = R v i < 0 guarantees its strict concavity. In turn, the second derivative with respect to the control of defender is 2 H u i 2 = R u i λ i μ i θ i θ i 1 S i u i θ i 2 > 0 , since the shadow price of operational stability confirms strict convexity. Consequently, the controls u i * and v i * found from the stationarity conditions actually provide the Hamiltonian with a saddle point on a given set of admissible controls.
To rigorously justify the existence and uniqueness of a solution to the optimal control problem in saddle point form, we relied on an extended set of sufficient conditions. Satisfaction of the strengthened Legendre–Clebsch condition, i.e., strict concavity of the Hamiltonian with respect to the attacker’s control and strict convexity with respect to the defender’s control, guarantees the existence of a local extremum. However, the global correctness of the solution was ensured by an additional check of the Lipschitz property of the right-hand sides of the equations of state on a limited set of admissible phase coordinates. Moreover, for a rigorous justification of the terminal states in the differential game under consideration, the condition [10] was applied. It guarantees the absence of singular discontinuities of the adjoint variables at the right end of the trajectory t   =   T in the presence of a terminal penalty. Fulfillment of this condition formally confirms the validity of using standard transversality equations when searching for Nash equilibrium in the class of software strategies.
Let us assume that the attacker’s strategy is v i * . Differentiating H with respect to v i , we obtain:
H v i = R v i v i + η i β i S i 1 u i = 0 .
Taking into account the constraints on the control action, the analytical solution for the attacker will take the form of a projection onto the feasible set:
v i * t = max 0 , min v m a x , η i t β i S i t 1 u i t R v i .
Expression (7) proves that the adversary will concentrate attacking power in those sectors where the throughput ( S i ) is high, the current cryptographic protection 1 u i is weak, and the value of the stolen data ( η i ) exceeds the cost of interception ( R v i ).
Accordingly, the defender’s strategy is ( u i * ). Differentiating H with respect to u i , we obtain the balance of forces equation:
H u i = R u i u i λ i μ i θ i S i u i θ i 1 + λ i Ω i H i Ψ τ η i β i v i S i η i γ i H i = 0 .
To analytically confirm the existence and uniqueness of a saddle point in the differential game under consideration, we relied on the strengthened Legendre–Clebsch condition. The strict concavity of the Hamilton–Pontryagin function with respect to the attacker’s control is confirmed by the negative-definite second derivative 2 H υ i 2 = R υ i < 0 . Similarly, strict convexity with respect to the defender’s control is ensured by the condition 2 H u i 2 > 0 over the entire set of admissible controls. Together with the Lipschitz condition for the right-hand sides of the bounded phase space, where S i 0 , K i , these properties guarantee that the optimal trajectories u * t and υ * t found from the stationarity conditions will form a Nash equilibrium in the class of program strategies, excluding the multiplicity of terminal defense states.
Since the nonlinearity index θ i > 1 of process friction (usually θ i ∈ [2, 4] for legacy SCADA systems), Equation (8) does not have an explicit analytical solution in radicals. Finding the optimal u i * t 0 , u m a x is reduced to finding the root of the residual function Φ u i = H u i at each integration step using numerical methods.
To close the two-point boundary value problem, we derive differential equations for the conjugate variables.
The equation of the shadow price of operational stability is as follows:
λ ˙ i = H S i = 2 Q i K i S i λ i α i 1 2 S i K i μ i u i θ i + k = 1 N λ k w k i Θ ~ ( K i c r i t S i ) η i β i v i 1 u i .
Here, the appearance of the sum λ k w k i will describe the “echo of cascading failures.” And the resilience value of the i -th node depends on how its failure will affect all dependent k -th nodes in the network.
Equation of the shadow price of intercepted data:
η ˙ i = H H i = λ i Ω i 1 u i Ψ τ + η i γ i u i .
The formulation of the problem is completed by conditions (11) and (12) of transversality at the right end of the trajectory ( t = T ):
λ i T = F i K i S i T ,
η i T = 0 .
The sets of admissible controls of the defender and attacker are defined as convex compact sets U L 0 , T and V L 0 , T . The right-hand sides of the equations of state (1) and (2) are continuously differentiable with respect to the phase variables S , H and controls u , υ and due to the boundedness of the phase space, since S i 0 , K i satisfy the Lipschitz condition. This guarantees the existence and uniqueness of an absolutely continuous solution to the system for any pair of admissible controls. By calculating the second derivatives of the Hamiltonian, we verified that the integrand (3) is strictly convex in u and strictly concave in υ . According to Isaacs’s generalized minimax theorems for nonlinear differential games, the simultaneous fulfillment of the conditions of convexity–concavity of the Hamiltonian and Lipschitz continuity of the right-hand sides is a sufficient condition for the existence of a unique saddle point solution in the class of program strategies.
The meaning of condition (12) is that after the expiration of the planning horizon, i.e., after overcoming Q-Day, new intercepted data no longer poses a hidden threat to the defender within the framework of the HNDL attack under study.
The formulated mathematical model (1)–(12) is a complex two-point boundary value problem (TPBVP). We integrate the equations of state forward in time from 0 to T . The adjoint equations depend on the terminal conditions and are integrated in reverse time from T to 0 . For the numerical solution, this paper uses the Forward–Backward Sweep Method (FBSM) iterative algorithm [29,30].
The sequence of application of the FBSM algorithm is as follows:
Step 1. Initialization. We set initial guesses for the control vectors u 0 t and v 0 t on the entire time grid t 0 , T . We set the iteration counter m = 0 .
Step 2. Direct pass. Using the initial conditions S i 0 and H i 0 , we integrate the equations of state S ˙ i and H ˙ i using the fourth-order Runge–Kutta method using the current controls u m t and v m t . Save the trajectories S m t and H m t .
Step 3. Transversality conditions. We calculate the boundary values of the conjugate variables λ i m T and η i m T based on the obtained states S i m T .
Step 4. Backward pass. Integrate the adjoint equations λ ˙ i and η ˙ i backward from t = T to t = 0 using the trajectories S m t , H m t , u m t , and v m t . Save the trajectories λ m t and η m t .
Step 5. Control updating. Based on the new states and adjoint variables, we calculate new control candidates u ~ t and v ~ t by solving equations H u i = 0 and H v i = 0 .
Step 6. Smoothing. To prevent numerical oscillations and ensure convergence, new controls are updated using a convex combination with the learning step ϵ 0,1 :
u m + 1 t = 1 ϵ u m t + ϵ u ~ t ,
v m + 1 t = 1 ϵ v m t + ϵ v ~ t .
Step 7. Convergence check. Calculate the norm of the difference u m + 1 u m + v m + 1 v m . If it is less than the specified tolerance threshold δ , the algorithm is valid. Otherwise, m = m + 1 , and the process returns to Step 2.
Algorithm 1 allowed finding equilibrium trajectories for conflict development, moving from a hypothesis to a substantiated optimal management of CII resources during the transition to post-quantum cryptography. Pseudocode for the proposed model is provided below.
Algorithm 1: Forward–Backward Sweep Method (FBSM) for PQC migration
Planning horizon T , integration step Δ t ;
Network and cost parameters: K i , α i ,   w i j ,   μ i ,   Ω i ,   β i ,   γ i ,   Q i ,   R u , i ,   R υ , i ,   θ i ,   F i
Convergence tolerance ϵ 0 , 1 .
Output:
Optimal control trajectories u i * t , υ i * t ;
Optimal state trajectories S i * t , H i * t .
Initialization: Set m   =   0  and  e r r o r = .
Set initial states for all sectors i: S i 0 = S i , 0 ,     H i 0 = H i , 0 .
Initialize control guesses u i 0 t   a n d   υ i 0 t  for  t 0 , T .
While  e r r o r > δ  do:
Forward Sweep:
Solve the state system (equations for  d S i / d t  and  d H i / d t  from  t = 0  to  T  using the 4th-order Runge–Kutta method (RK4), employing current controls u i m t   a n d   υ i m t .
Store the resulting state trajectories as S i m t  and  H i m t .
Transversality Conditions:
Calculate terminal values for adjoint variables:
                                              λ i m T = F i K i S i m T
η i m T = 0
Backward Sweep:
Solve the adjoint system (equations for d λ i d t  and  d η i d t  backward in time from  t = T  to 0 using RK4, employing current states S i m t , H i m t  and controls u i m t   a n d     υ i m t .
Store the resulting adjoint trajectories as λ i m t  and  η i m t .
Control Update:
For each time step t 0 , T  and sector i:
  • Update hacker’s control: υ ~ i t = max 0 , min υ m a x , η i β i S i 1 u i R υ , i .
  • Update defender’s control u ~ i t by solving the stationarity condition: H u i .
Relaxation Smoothing:
                                            u i m + 1 t = 1 ϵ u i m t + ϵ u ~ i t
                                            υ i m + 1 t = 1 ϵ υ i m t + ϵ υ ~ i t
Convergence Check:
e r r o r   = i 0 T u i m + 1   u i m + υ i m + 1   υ i m d t .
End While
Return  S i m t ,     H i m t ,     u i m t ,     υ i m t   as the optimal solution.
Model (1)–(12) assumes a deterministic nature of attack detection. Furthermore, the connectivity matrix in the subsequent computational experiment is specified statically. In future studies, we plan to move to stochastic differential games and dynamic CII graphs.

5. Computational Experiment

5.1. Stages of the Computational Experiment

The purpose of the computational experiment is the numerical verification of the game–theoretic model described above and the search for equilibrium strategies in the conditions of resource confrontation between the defender and the attacker.
The simulation process is implemented in the following sequence:
Stage 1—topology initialization. We form a heterogeneous CII network consisting of N = 3 macronodes reflecting the CII base. Accepted: Sector 1—energy; Sector 2—financial sector; Sector 3—public administration.
Stage 2—numerical integration. The forward pass (integration of the equations of state S i and H i ) and the backward pass (integration of the adjoint equations λ i and η i ) are performed using the explicit Runge–Kutta method of the fourth order of accuracy (RK4). The discretization step Δ t is chosen to be small enough to ensure the stability of the solution of the stiff system in the neighborhood of the point τ Q .
Stage 3—control optimization. At each iteration, the vectors u i t and v i t are recalculated according to the Hamiltonian stationarity conditions. Convergence of the algorithm is ensured by using relaxation smoothing with an adjustable step size.
Stage 4—scenario analysis. The resulting optimal equilibrium trajectories are compared with the basic heuristic strategies—reactive and aggressive—to quantify the gains from applying the differential game.
Although the presented topology of three macro-sectors, i.e., energy, finance, and public administration, is demonstrative within the framework of the article, the developed mathematical apparatus is invariant with respect to the dimensionality of the CII graph. The vector form of the equations of state (1) and (2) allows the model to be scaled to systems with an arbitrary number of nodes N . The choice of three nodes is driven by the need to clearly visualize cascading effects between sectors with fundamentally different levels of “technological friction.” That is, high in energy and low in finance. The use of normalized parameters was dictated by the lack of publicly available, accurate data on the performance of industrial SCADA systems when implementing PQC protocols. However, their ranges of variation were fully consistent with the results of the latest NIST benchmarks and security forecasts for 2026.

5.2. Methodology for Conducting Simulation

To ensure the representativeness of the experiment, the parameter space was divided into structural constants. The components, respectively, reflected the physical properties of the CII and the weighting coefficients of the target functional. The parameter values were normalized. However, the relative proportions of the parameters have so far been calibrated based on expert assessments of the specific operating characteristics of legacy systems, in particular, SCADA systems in the energy sector of the Republic of Kazakhstan and modern IP control loops. Table 1 shows the base values and variation ranges of the parameters used in the simulation.
The cascading influence of nodes is described through a connectivity matrix W = w i j . In the baseline scenario, for three macronodes, it is statically defined as W = 0 0.4 0.3 0.1 0 0.2 0.1 0.2 0 . This structure reflects an asymmetrical relationship. That is, the financial and public sectors of Kazakhstan are highly vulnerable to disruptions in the w 12 = 0 ,   4 , w 13 = 0.3 energy sector, while their reverse impact is less pronounced.
The simulation results are presented in Figure 1, Figure 2, Figure 3 and Figure 4.
Figure 1 shows a decline in operational resilience across all sectors. The most pronounced decline is observed in Kazakhstan’s energy sector. This is due to the high value of the technological friction parameter μ = 0.8 and the nonlinearity of θ = 3 . After the onset of Q-Day ( t = 50 ) we observe an additional drop of S i t , caused by the activation of the term Ω i H i 1 u i Ψ τ in Equation (1), which models the damage from decrypting the accumulated data. The cascading impact of the energy sector on the financial sector and public administration manifests itself as a lagged decline in their resilience. This decline is consistent with the connectivity matrix w i j .
Figure 2 shows the growth in the volume of intercepted data H i t . The highest rate of accumulation is characteristic of the financial sector ( β 2 = 1.0 ) and public administration. However, in the latter case H 3 t it reaches its maximum value and is maintained due to the low rate of information obsolescence γ 3 = 0.01 . In the energy sector of Kazakhstan, despite moderate β 1 = 0.5 , data accumulation is limited by earlier exhaustion of stability and a smaller share of vulnerable channels after Q-Day.
Figure 3 shows the defender’s optimal strategy. For the financial sector, we observe that the target level of protection is achieved by t = 50 . The sharp decrease in control intensity u 2 t in the final phase, after t = 80 , is explained by the complete completion of the infrastructure upgrade process. In other words, once all critical channels have been migrated to PQC, further expenditure of excess resources on “migration” will become impractical, according to the cost minimization functional R u i . This does not imply a loss of protection, but rather reflects the optimal termination of the active implementation phase.
To assess the robustness of the proposed model and the stability of optimal controls, a sensitivity analysis was also conducted on the fundamental parameters of the model described above—specifically, the coefficient of technological friction μ 1 (for the energy sector) and the connectivity weight ω 12 (the impact of the energy sector on the financial sector). Thus, varying the μ 1 parameter within ±20% of the baseline value (0.8) demonstrated predictable structural stability. That is, as technological friction decreased, the defender’s equilibrium strategy u 1 1 shifted toward earlier migration to PQC algorithms. Accordingly, this led to a 12–15% reduction in the volume of intercepted data H 1 τ Q . The shape of the control curve remained unchanged. A 15% variation in ω 12 demonstrated the system’s robustness. The time to reach 90% protection in the dependent (financial) sector changed only slightly, within Δ t = 2.5 , but the penalty losses in the objective functional u , v increased significantly. This confirmed that the strategies remained stable with small parameter fluctuations. However, it should be noted that the final cost of maintaining stability may vary.
To quantitatively evaluate the effectiveness of the proposed strategy, a comparison was conducted with a reactive scenario, i.e., implementing PQC only when a critical data compromise threshold is reached. The comparison results are presented in Table 2.
To rigorously quantitatively assess the robustness of the resulting solution to the uncertainty of the initial data, an elasticity index of the objective functional was additionally calculated. The analysis showed that simultaneous variation in the main parameters, i.e., the coefficient of technological friction and the weights of the connectivity matrix, within ±20% of their base values, leads to a change in the integral payment functional by no more than 7.4%. Moreover, the topology of the optimal trajectories maintained structural stability. That is, the shift in the protection strategy switching points over time was minimal. These indicators confirmed that the proposed mathematical model is not susceptible to overfitting to specific initial conditions. The model maintained predictive accuracy even with significant fluctuations in the performance of heterogeneous infrastructure components. An additional ablation analysis was also conducted to assess the contribution of individual model components. Disabling the “cascade connections” factor, i.e., setting the W matrix to zero, leads to an underestimation of systemic risk in the financial sector by 24%. This demonstrates the need to use a network-centric approach. Ignoring the friction nonlinearity ( θ = 1 instead of θ = 3 ) leads to unrealistic predictions of the instantaneous implementation of PQC. This, in reality, would cause a collapse of the operational stability of energy networks.

6. Discussion of the Research Results

A computational experiment has revealed a number of non-obvious systemic effects that arise when requirements for cryptographic strength and operational reliability collide in heterogeneous CII networks, including those of the Republic of Kazakhstan.
The fundamental insight of the simulation was the confirmation of the nonlinear nature of the HNDL strategy. Unlike classic DDoS or ransomware attacks, where damage is inflicted instantly, in the proposed game, the attacker uses time as their primary resource. As demonstrated by optimal control behavior v i * t , the adversary abruptly ceases investing in traffic interception immediately after passing the Q-Day point. This mathematically proved that the focus of CII defense, including for RK, must shift from “continuous counteraction” to a “race to the top” paradigm. If the defender fails to implement post-quantum cryptography by time τ Q , further expenditures on encrypting compromised channels will lose strategic value. The model presented in the article demonstrated the vulnerability of CII networks with a high proportion of legacy equipment using the example of the energy sector of Kazakhstan. The forced implementation of resource-intensive PQC algorithms will create a situation in which the defender, in its attempt to mitigate the cryptographic threat, will undermine its own operational resilience. This means it will itself cause technological friction. This leads to the following practical conclusion: For SCADA-class systems, a direct replacement of encryption algorithms is unacceptable. Flexible migration strategies are required, including hardware upgrades before upgrading cryptographic protocols.
An analysis of changes in interdependent nodes confirmed the presence of a delayed cascading degradation. The financial sector and public administration in Kazakhstan, while experiencing high rates of migration to PQC, nevertheless experienced a decline in resilience during the simulation due to resource depletion in the adjacent, i.e., energy, sector. This demonstrated the inadequacy of an isolated, sector-specific approach to CII information security. Optimal management of defender resources at a saddle point requires cross-industry synchronization. In other words, budgets and computing power should be allocated not on a “fair” basis, but with priority given to protecting the most connected (protection-critical) basic nodes of the CII graph.
From a practical perspective, the resulting equilibrium strategies u i * t offer decision makers and CII operators a concrete risk management algorithm. First and foremost, they highlight the need for a network connectivity audit. That is, PQC implementation budgets should be allocated not uniformly across sectors, but prioritized toward core nodes with the greatest cascading potential. In the case of Kazakhstan, for example, this is the energy sector. Furthermore, the optimal trajectory proves that legacy SCADA-class systems will require a large-scale hardware upgrade beforehand. And attempting to implement PQC solely through software will only lead to infrastructure failure even before Q-Day. Regulators in Kazakhstan, as well as other countries, should develop interim security standards that allow for hybrid encryption for such systems. This is necessary to smooth out peaks of technological friction and prevent a domino effect in related financial and government sectors.
To quantitatively evaluate the effectiveness of the identified equilibrium control, a comparison with the baseline scenario was conducted. The baseline metric was a typical “reactive” PQC implementation strategy, in which protection u i * t is activated linearly or only after reaching a critical data compromise threshold. The reactive scenario ignores the nonlinearity of cascading failures. This, within our model, inevitably leads to an avalanche-like decline in S i t in dependent sectors before Q-Day. In contrast, optimal feedforward control, found using the maximum principle, synchronizes cross-sector migration, minimizing technological friction and avoiding unacceptable terminal protection states at the end of the planning horizon T .
It should be noted that although the current numerical simulation is limited to a demonstration topology of three macro-sectors, the proposed differential game architecture is mathematically invariant to graph dimension. The vector representation of Equations (1) and (2) allows for direct scaling of the model to N-dimensional networks of arbitrary complexity. This makes the model a fully fledged decision support tool, requiring only calibration of the weighting coefficients of the connectivity matrix W to the specific conditions of a given state.
Such research will, among other things, include calibration of parameters ( μ i ,   α i ,   W ) based on telemetry currently collected from SCADA system operators in Kazakhstan.
The proposed differential game provides a basis for macroscopic analysis of migration on PQC. However, in reality, the process of data interception leaves digital traces, the analysis of which will require additional resource expenditures. We plan to focus future research on expanding the model by integrating the costs of proactively searching for digital artifacts in the stages preceding Q-Day into the defender’s functionality.

7. Conclusions

A pressing scientific problem of synthesizing optimal protection strategies for heterogeneous critical information infrastructures (CIIs) in the face of a growing quantum threat and limited computing resources has been solved. The developed mathematical framework of a zero-sum antagonist differential game allows describing the contradiction between the need for accelerated implementation of post-quantum cryptography (PQC) and the risk of losing the operational resilience of legacy CII systems. Based on the theoretical analysis and computational experiment, the following key conclusions were formulated. The criticality of the time factor was mathematically proven. The temporal nature of the HNDL attack requires proactive, rather than reactive, allocation of defender resources. Optimal control trajectories show that delaying PQC implementation until quantum supremacy (Q-Day) will lead to irreversible data compromise and make further investment in cryptographic protection for this CII segment economically unfeasible. The need for synchronized migration is justified. This confirms the hypothesis that local “technological friction” during the upgrade of resource-intensive components, in particular SCADA systems in the energy sector of the Republic of Kazakhstan, is inevitably transmitted to related sectors—finance, public administration, etc.—through the connectivity matrix. The saddle point found proved that the minimization of systemic damage was achieved solely through cross-sectoral coordination of management actions and not through maximizing the protection of isolated nodes.
The proposed FBSM-based algorithm creates a ready-made analytical toolkit for relevant government agencies, including the Republic of Kazakhstan. The model enables quantitative assessment of acceptable bandwidth degradation limits for communication channels and planning equipment upgrade schedules in anticipation of the transition to PQC.
In this paper, the attacker’s data interception process is considered without considering the costs of ensuring stealth. In the future, we plan to expand the proposed game–theoretic framework by integrating probabilistic metrics for detecting digital traces left by attackers during the traffic accumulation phase into the defender’s functionality. This will allow moving to stochastic differential games and take into account the defender’s costs for proactive threat hunting.

Author Contributions

Conceptualization, F.M. and V.L.; methodology, F.M., V.L., and G.B.; software, M.L.; validation, Z.A., K.T., and G.B.; formal analysis, Z.A.; investigation, V.L.; resources, F.M. and Z.A.; data curation, M.L.; writing—original draft preparation, K.T.; writing—review and editing, Z.A.; visualization, G.B.; supervision, F.M.; project administration, V.L.; funding acquisition, G.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Qader, T. Systematic Security: Building Quantum Security: Preparing for Q-Day and Beyond; CRC Press: Boca Raton, FL, USA, 2026. [Google Scholar]
  2. Mosca, M. Cybersecurity in an era with quantum computers: Will we be ready? IEEE Secur. Priv. 2018, 16, 38–41. [Google Scholar] [CrossRef]
  3. Bellizia, D.; El Mrabet, N.; Fournaris, A.P.; Pontié, S.; Regazzoni, F.; Standaert, F.X.; Tasso, É.; Valea, E. Post-quantum cryptography: Challenges and opportunities for robust and secure hw design. In 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Virtual, 6–8 October 2021; IEEE: New York, NY, USA, 2021; pp. 1–6. [Google Scholar] [CrossRef]
  4. Burita, L.; Le, D.T. Cyber security and APT groups. In Proceedings of the 2021 Communication and Information Technologies (KIT), Prague, Czech Republic, 13–15 October 2021; IEEE: New York, NY, USA, 2021; pp. 1–7. [Google Scholar]
  5. Bavdekar, R.; Chopde, E.J.; Agrawal, A.; Bhatia, A.; Tiwari, K. Post-quantum cryptography: A review of techniques, challenges and standardizations. In Proceedings of the 2023 International Conference on Information Networking (ICOIN), Bangkok, Thailand, 11–14 January 2023; IEEE: New York, NY, USA, 2023; pp. 146–151. [Google Scholar]
  6. Zhang, H.; Jiang, L.V.; Huang, S.; Wang, J.; Zhang, Y. Attack-defense differential game model for network defense strategy selection. IEEE Access 2019, 7, 50618–50629. [Google Scholar] [CrossRef]
  7. Tushar, W.; Yuen, C.; Saha, T.K.; Nizami, S.; Alam, M.R.; Smith, D.B.; Poor, H.V. A survey of cyber-physical systems from a game-theoretic perspective. IEEE Access 2023, 11, 9799–9834. [Google Scholar] [CrossRef]
  8. Liu, D.; Lv, T.; Su, W.; Cong, L.; Wu, D. A game theory model for network attack–defense strategy selection in power Internet of Things. Electronics 2026, 15, 426. [Google Scholar] [CrossRef]
  9. Yang, J.; Li, R.; Gan, Q.; Huang, X. Zero-sum-game-based fixed-time event-triggered optimal consensus control of multi-agent systems under FDI attacks. Mathematics 2025, 13, 543. [Google Scholar] [CrossRef]
  10. Lakhno, V.; Desiatko, A.; Chubaievskyi, V.; Roskladka, A.; Kaminskyi, S. Mathematical modelling and adaptation strategies in the confrontation between cryptocurrencies and quantum computers. In Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2025), Kyiv, Ukraine, 28 February 2025; pp. 562–569. [Google Scholar]
  11. Naik, A.S.; Yeniaras, E.; Hellstern, G.; Prasad, G.; Vishwakarma, S.K.L.P. From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. Financ. Innov. 2025, 11, 88. [Google Scholar] [CrossRef]
  12. Kagai, F.; Branch, P.; But, J.; Allen, R. Harvest-now, decrypt-later: A temporal cybersecurity risk in the quantum transition. Telecom 2025, 6, 100. [Google Scholar] [CrossRef]
  13. Mascelli, J.; Rodden, M. Harvest Now Decrypt Later: Examining Post-Quantum Cryptography and the Data Privacy Risks for Distributed Ledger Networks. Available online: https://www.federalreserve.gov/econres/feds/harvest-now-decrypt-later-examining-post-quantum-cryptography-and-the-data-privacy-risks-for-distributed-ledger-networks.htm (accessed on 14 March 2026).
  14. Chou, S.H.; Yang, Y.H.; Chin, W.L.; Chen, C.; Tsao, C.Y.; Tung, P.L. High-throughput post-quantum cryptographic system: CRYSTALS-Kyber with computational scheduling and architecture optimization. Electronics 2025, 14, 2969. [Google Scholar] [CrossRef]
  15. Gupta, N.; Jati, A.; Chattopadhyay, A. CRYSTALS-Dilithium on RISC-V processor: Lightweight secure boot using post-quantum digital signature. In Proceedings of the 2023 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Francisco, CA, USA, 29 October–2 November 2023; IEEE: New York, NY, USA, 2023; pp. 1–7. [Google Scholar]
  16. Alagic, G.; Bros, M.; Ciadoux, P.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Liu, Y.K.; Miller, C.; et al. Status report on the first round of the additional digital signature schemes for the nist post-quantum cryptography standardization process. In NIST Interagency/Internal Report (NISTIR); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024. [Google Scholar] [CrossRef]
  17. Adapting Constrained Devices for Post-Quantum Cryptography; draft-ietf-pquip-pqc-hsm-constrained-03. Available online: https://datatracker.ietf.org/doc/draft-ietf-pquip-pqc-hsm-constrained/ (accessed on 14 March 2026).
  18. del Moral, J.O.; deMarti iOlius, A.; Vidal, G.; Crespo, P.M.; Martinez, J.E. Cybersecurity in critical infrastructures: A post-quantum cryptography perspective. IEEE Internet Things J. 2024, 11, 30217–30244. [Google Scholar] [CrossRef]
  19. Ghosh, S.; Zaman, M.; Joshi, R.; Sampalli, S. Multi-phase quantum resistant framework for secure communication in SCADA systems. IEEE Trans. Dependable Secur. Comput. 2024, 21, 5461–5478. [Google Scholar] [CrossRef]
  20. El Bizri, M.; El-Hajj, A.M.; Sliman, L.; Haidar, A.M. Institutional approaches to post-quantum cryptography: A comparative analysis of migration frameworks. IEEE Access 2026, 14, 3259–3283. [Google Scholar] [CrossRef]
  21. Geremew, A.; Mohammad, A. Preparing critical infrastructure for post-quantum cryptography: Strategies for transitioning ahead of cryptanalytically relevant quantum computing. Int. J. Eng. Sci. Technol. 2024, 6, 338–365. [Google Scholar] [CrossRef]
  22. Boccaletti, S.; Chavez, M. Synchronization of complex networks. In Advanced Topics on Cellular Self-Organizing Nets and Chaotic Nonlinear Dynamics to Model and Control Complex Systems; Springer: Berlin/Heidelberg, Germany, 2008; pp. 123–157. [Google Scholar]
  23. Venkatasubramanian, B.V.; Laoudias, C.; Panteli, M. Cascading failures and resilience in interdependent critical infrastructures: A dynamic approach. IEEE Syst. J. 2025, 19, 999–1010. [Google Scholar] [CrossRef]
  24. Battiston, F.; Petri, G. Higher-Order Systems; Springer: Cham, Switzerland, 2022. [Google Scholar]
  25. Nägele, T.; Hooman, J. Co-simulation of cyber-physical systems using HLA. In Proceedings of the 2017 IEEE Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 9–11 January 2017; IEEE: New York, NY, USA, 2017; pp. 1–6. [Google Scholar]
  26. Wang, J.; Chen, H.; Sun, Z. Context-aware quantification for VANET security: A Markov chain-based scheme. IEEE Access 2020, 8, 173618–173626. [Google Scholar] [CrossRef]
  27. He, X.; Cha, E.J. Modeling the damage and recovery of interdependent civil infrastructure network using dynamic integrated network model. Sustain. Resilient Infrastruct. 2020, 5, 152–167. [Google Scholar] [CrossRef]
  28. Karakaya, A.; Ulu, A. A survey on post-quantum-based approaches for edge computing security. WIREs Comput. Stat. 2024, 16, e1644. [Google Scholar] [CrossRef]
  29. Radwan, A.; Alenezi, T.A.; Alrashdan, W.; Hwang, W.J. Balancing tradeoffs in network queue management problem via forward–backward sweeping with finite checkpoints. Symmetry 2023, 15, 1395. [Google Scholar] [CrossRef]
  30. Alrashdan, W.; Radwan, A. Storage reduction of forward-backward sweeping method of optimal control of active queue management. In International Conference on Optimization, Simulation and Control; Springer International Publishing: Cham, Switzerland, 2022; pp. 129–137. [Google Scholar]
Figure 1. Operational sustainability of CII sectors over planning horizon T .
Figure 1. Operational sustainability of CII sectors over planning horizon T .
Information 17 00485 g001
Figure 2. Changes in the accumulated volume of compromised data H i t in each sector within the HNDL strategy.
Figure 2. Changes in the accumulated volume of compromised data H i t in each sector within the HNDL strategy.
Information 17 00485 g002
Figure 3. Optimal strategy of defender u i * t —proportion of channels transferred to post-quantum algorithms (PQC).
Figure 3. Optimal strategy of defender u i * t —proportion of channels transferred to post-quantum algorithms (PQC).
Information 17 00485 g003
Figure 4. Optimal strategy of attacker v i * t —intensity of resource allocation for intercepting traffic in each sector.
Figure 4. Optimal strategy of attacker v i * t —intensity of resource allocation for intercepting traffic in each sector.
Information 17 00485 g004
Table 1. System parameters and weighting coefficients of the differential game.
Table 1. System parameters and weighting coefficients of the differential game.
DesignationParameter NameValue/RangePhysical and Economic Meaning
Environment and Topology Parameters
N Network dimension3The three main sectors of the Republic of Kazakhstan are energy (high friction), finance (high connectivity), and public administration (high data value).
T Planning horizon100 c.u.The period encompassing the accumulation phase, the point of quantum supremacy, and post-crisis stabilization.
τ Q Expected Q-Day point50 c.u.Chronological moment of activation of the accumulated quantum threat (HNDL).
ν Steepness of the function Ψ τ 2.0The speed of transition from the classical paradigm of threats to the quantum one.
CII Node Change Parameters  i 1 , 2 , 3
α i Coefficient of recovery0.05–0.15Inertia of repair and IT services. Minimal for energy, maximum for finance.
μ i Technological friction0.2–0.8PQC implementation overhead costs. Maximum for legacy industrial controllers in the energy sector.
θ i Nonlinearity of friction2.0–4.0Exponential growth of load as the share of PQC traffic approaches 100%.
β i Interception efficiency0.5–1.0The adversary’s basic ability to accumulate encrypted traffic of a node.
γ i Data aging rate0.01–0.5The life cycle of information. For the state administration RK γ 0 , data remains relevant for decades.
Ω i Specific data criticality1.0–10.0Potential damage from decrypting 1 TB of sector data after Q-Day.
Payment Functionality Coefficients—Game Parameters
Q i Penalty for loss of stability1.0–5.0The strategic importance of the continuity of the sector’s operations for the state.
R u i Defender control cost0.5–2.0Budget constraints and costs for the forced procurement of PQC-compatible equipment.
R v i Attacker’s resource cost0.5–1.5APT group’s costs for storage systems and computing clusters for the HNDL attack.
F i Terminal fine5.0–10.0The significance of the final state of the system at time T .
Table 2. The results of comparing the proposed strategy with the reactive scenario.
Table 2. The results of comparing the proposed strategy with the reactive scenario.
MetricReactive StrategyOptimal Control
(Model)
Improvement (%)
Integral loss (Functional J)145.2118.718.2%
Accumulated data volume (H at time T)2840 conventional units1960 conventional units31.0%
Average stability level ( S a v g )62.4%81.6%30.8%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Malikova, F.; Lakhno, V.; Alimseitova, Z.; Lakhno, M.; Togzhanova, K.; Beketova, G. Antagonistic Differential Game of Critical Infrastructure Migration Management to Post-Quantum Cryptography Under HNDL Conditions. Information 2026, 17, 485. https://doi.org/10.3390/info17050485

AMA Style

Malikova F, Lakhno V, Alimseitova Z, Lakhno M, Togzhanova K, Beketova G. Antagonistic Differential Game of Critical Infrastructure Migration Management to Post-Quantum Cryptography Under HNDL Conditions. Information. 2026; 17(5):485. https://doi.org/10.3390/info17050485

Chicago/Turabian Style

Malikova, Feruza, Valery Lakhno, Zhuldyz Alimseitova, Myroslav Lakhno, Kuljan Togzhanova, and Gulzhanat Beketova. 2026. "Antagonistic Differential Game of Critical Infrastructure Migration Management to Post-Quantum Cryptography Under HNDL Conditions" Information 17, no. 5: 485. https://doi.org/10.3390/info17050485

APA Style

Malikova, F., Lakhno, V., Alimseitova, Z., Lakhno, M., Togzhanova, K., & Beketova, G. (2026). Antagonistic Differential Game of Critical Infrastructure Migration Management to Post-Quantum Cryptography Under HNDL Conditions. Information, 17(5), 485. https://doi.org/10.3390/info17050485

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop