From Bytes to Qubits: The Cybersecurity Implications of Quantum Advancements

  • Download 39
  • File Size 360.90 KB
  • File Count 1
  • Create Date 12/09/2024
  • Last Updated 12/09/2024

From Bytes to Qubits: The Cybersecurity Implications of Quantum Advancements

Afrah Ayub1, Sharlene Anna Pereira2, Mohammed Amaan Thayyil3, Mahi Ayub4

1UG Student School of Computing and Information Technology, REVA University, Bengaluru, Karnataka, India

23Department of Computer Science and Engineering, School of Engineering and Technology, Christ University, Kengeri Campus, Bengaluru, Karnataka, India

4Department of Computer Science and Engineering, School of Computer Science, Presidency University, Bengaluru, Karnataka, India

Abstract— Quantum computing, poised to revolutionize the computational landscape, presents both unprecedented opportunities and significant challenges, particularly in the realm of cryptography. This paper delves into the transformative potential of quantum computing, exploring its foundational principles, such as qubits, superposition, and entanglement, which enable parallel processing far beyond classical capabilities. We examine the critical threats quantum computing poses to current cryptographic systems, especially through algorithms like Shor's and Grover's, which could render widely-used encryption methods obsolete. In response to these threats, we explore the development of post-quantum cryptography, including lattice-based, hash-based, and isogeny-based approaches, as well as the ongoing efforts to standardize these quantum-resistant algorithms. Additionally, we discuss the policy and regulatory considerations essential for guiding the responsible evolution of quantum computing technology. This paper underscores the urgency of advancing quantum-resistant cryptographic techniques and the importance of international collaboration in shaping the future of quantum computing.

Keywords— quantum computing, cryptography, post-quantum cryptography, Shor's algorithm, Grover's algorithm, quantum-resistant algorithms, cybersecurity


Download