From Bytes to Qubits: The Cybersecurity Implications of Quantum Advancements

Find us on Google Scholar
Peer Review Policy
Article Processing Charges
Publication Procedure
Research Topics
FAQ
Copyright Infringement
Refund and Cancellation Policy
  • Version
  • Download 100
  • File Size 360.90 KB
  • File Count 1
  • Create Date 12/09/2024
  • Last Updated 12/09/2024

From Bytes to Qubits: The Cybersecurity Implications of Quantum Advancements

Afrah Ayub1, Sharlene Anna Pereira2, Mohammed Amaan Thayyil3, Mahi Ayub4

1UG Student School of Computing and Information Technology, REVA University, Bengaluru, Karnataka, India

23Department of Computer Science and Engineering, School of Engineering and Technology, Christ University, Kengeri Campus, Bengaluru, Karnataka, India

4Department of Computer Science and Engineering, School of Computer Science, Presidency University, Bengaluru, Karnataka, India

Abstract— Quantum computing, poised to revolutionize the computational landscape, presents both unprecedented opportunities and significant challenges, particularly in the realm of cryptography. This paper delves into the transformative potential of quantum computing, exploring its foundational principles, such as qubits, superposition, and entanglement, which enable parallel processing far beyond classical capabilities. We examine the critical threats quantum computing poses to current cryptographic systems, especially through algorithms like Shor's and Grover's, which could render widely-used encryption methods obsolete. In response to these threats, we explore the development of post-quantum cryptography, including lattice-based, hash-based, and isogeny-based approaches, as well as the ongoing efforts to standardize these quantum-resistant algorithms. Additionally, we discuss the policy and regulatory considerations essential for guiding the responsible evolution of quantum computing technology. This paper underscores the urgency of advancing quantum-resistant cryptographic techniques and the importance of international collaboration in shaping the future of quantum computing.

Keywords— quantum computing, cryptography, post-quantum cryptography, Shor's algorithm, Grover's algorithm, quantum-resistant algorithms, cybersecurity


Download
Follow Us

Google Scholar

ResearchGate

Facebook

Instagram

Working Hours

Mon – Sat: 9:00 AM – 6:00 PM

Sunday: 9:00 AM – 1:00 PM

📧 editor@ijsrem.com

📞 +91 93911 67991

Contact Us

International Journal of Scientific Research in Engineering and Management (IJSREM)

EDTECH PUBLISHERS (OPC) PRIVATE LIMITED

📍 #62/1, New No 7, 1st Cross, 2nd Main,
Ganganagar, R T Nagar, Bangalore North,
Bangalore, Karnataka, India – 560032

Visit Contact Page