The Impact of Quantum Computing on Cryptography: Opportunities and Challenges

Authors

  • Keerti Vyas, Amit Kumar Vyas, Amit Arora

Keywords:

cryptographic, quantum, security, unprecedented, frameworks

Abstract

Quantum computing represents a paradigm shift in computation that has the potential to significantly disrupt current cryptographic systems. While it offers unprecedented computational power, this technology also poses serious threats to the security of classical encryption methods. This paper explores the dual nature of quantum computing in the context of cryptography, examining both the opportunities it presents for developing quantum-resistant algorithms and the challenges it poses for existing cryptographic frameworks. Through a review of current literature and developments in the field, this study highlights the urgent need for adaptation in cryptographic practices to safeguard sensitive information against the capabilities of quantum computers.

Downloads

Download data is not yet available.

References

Nielsen, M. A., & Chuang, I. L. (2010). Quantum Computation and Quantum Information. Cambridge University Press.

Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26(5), 1484-1509.

Grover, L. K. (1996). A Fast Quantum Mechanical Algorithm for Database Search. Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC), 212-219.

Bennett, C. H., & Brassard, G. (1984). Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 175-179.

Acín, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., & Scarani, V. (2007). Device-Independent Security of Quantum Cryptography against Collective Attacks. Physical Review Letters, 98(23), 230501.

National Institute of Standards and Technology (NIST) (2016). NIST Special Publication 800-186: NIST Cybersecurity Framework (CSF) for Quantum-Resistant Cryptography.

Chen, L. K., Jordan, S., Liu, Y. K., & Mooney, C. (2016). Report on Post-Quantum Cryptography. NISTIR 8105.

Hoffman, J. (2020). The Quantum Internet: A New Paradigm for Secure Communication. Nature, 586(7828), 36-38.

Kwiat, P. G., Mattle, K., Weinfurter, H., & Zeilinger, A. (1995). New High-Intensity Source of Polarization-Entangled Photon Pairs. Physical Review Letters, 75(24), 4337-4341.

Kessler, E. M., et al. (2014). Quantum Key Distribution with Entangled Photons. Nature Communications, 5, 5396.

Wang, X., Chen, Y., & Yang, Y. (2019). Research on the Threat of Quantum Computing to Current Cryptography. Journal of Information Security, 10(2), 99-104.

Zhou, W., & Wang, X. (2020). A Survey of Quantum Key Distribution Protocols: Current Status and Future Trends. IEEE Access, 8, 54810-54829.

Bristol, C., et al. (2017). The Future of Secure Communication: Quantum Key Distribution. Security and Privacy, IEEE, 5(1), 40-47.

Lyu, J., Li, X., & Jiang, H. (2019). Practical Implementation of Post-Quantum Cryptography. International Journal of Information Security, 18(5), 527-546.

Ali, M. A., & Aslam, N. (2021). Quantum Computing and Its Impact on Information Security. International Journal of Computer Applications, 975(12), 22-29.

Cryptography and Security Research Group (2019). Post-Quantum Cryptography: Current Status and Future Directions.

Buchmann, J., & Deng, R. (2016). Post-Quantum Cryptography: Challenges and Opportunities. Journal of Cryptology, 29(2), 371-385.

Kumar, R., & Agrawal, A. (2020). Quantum Cryptography: Opportunities and Challenges in Quantum Era. International Journal of Computer Applications, 975(12), 23-27.

Downloads

Published

09.07.2024

How to Cite

Keerti Vyas. (2024). The Impact of Quantum Computing on Cryptography: Opportunities and Challenges. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 1868 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7003

Issue

Section

Research Article