The Impact of Quantum Computing on Cryptography: Opportunities and Challenges
Keywords:
cryptographic, quantum, security, unprecedented, frameworksAbstract
Quantum computing represents a paradigm shift in computation that has the potential to significantly disrupt current cryptographic systems. While it offers unprecedented computational power, this technology also poses serious threats to the security of classical encryption methods. This paper explores the dual nature of quantum computing in the context of cryptography, examining both the opportunities it presents for developing quantum-resistant algorithms and the challenges it poses for existing cryptographic frameworks. Through a review of current literature and developments in the field, this study highlights the urgent need for adaptation in cryptographic practices to safeguard sensitive information against the capabilities of quantum computers.
Downloads
References
Nielsen, M. A., & Chuang, I. L. (2010). Quantum Computation and Quantum Information. Cambridge University Press.
Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26(5), 1484-1509.
Grover, L. K. (1996). A Fast Quantum Mechanical Algorithm for Database Search. Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC), 212-219.
Bennett, C. H., & Brassard, G. (1984). Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 175-179.
Acín, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., & Scarani, V. (2007). Device-Independent Security of Quantum Cryptography against Collective Attacks. Physical Review Letters, 98(23), 230501.
National Institute of Standards and Technology (NIST) (2016). NIST Special Publication 800-186: NIST Cybersecurity Framework (CSF) for Quantum-Resistant Cryptography.
Chen, L. K., Jordan, S., Liu, Y. K., & Mooney, C. (2016). Report on Post-Quantum Cryptography. NISTIR 8105.
Hoffman, J. (2020). The Quantum Internet: A New Paradigm for Secure Communication. Nature, 586(7828), 36-38.
Kwiat, P. G., Mattle, K., Weinfurter, H., & Zeilinger, A. (1995). New High-Intensity Source of Polarization-Entangled Photon Pairs. Physical Review Letters, 75(24), 4337-4341.
Kessler, E. M., et al. (2014). Quantum Key Distribution with Entangled Photons. Nature Communications, 5, 5396.
Wang, X., Chen, Y., & Yang, Y. (2019). Research on the Threat of Quantum Computing to Current Cryptography. Journal of Information Security, 10(2), 99-104.
Zhou, W., & Wang, X. (2020). A Survey of Quantum Key Distribution Protocols: Current Status and Future Trends. IEEE Access, 8, 54810-54829.
Bristol, C., et al. (2017). The Future of Secure Communication: Quantum Key Distribution. Security and Privacy, IEEE, 5(1), 40-47.
Lyu, J., Li, X., & Jiang, H. (2019). Practical Implementation of Post-Quantum Cryptography. International Journal of Information Security, 18(5), 527-546.
Ali, M. A., & Aslam, N. (2021). Quantum Computing and Its Impact on Information Security. International Journal of Computer Applications, 975(12), 22-29.
Cryptography and Security Research Group (2019). Post-Quantum Cryptography: Current Status and Future Directions.
Buchmann, J., & Deng, R. (2016). Post-Quantum Cryptography: Challenges and Opportunities. Journal of Cryptology, 29(2), 371-385.
Kumar, R., & Agrawal, A. (2020). Quantum Cryptography: Opportunities and Challenges in Quantum Era. International Journal of Computer Applications, 975(12), 23-27.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Keerti Vyas, Amit Kumar Vyas, Amit Arora

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.