Quantum Computing Challenges and Impact on Cyber Security

被引:1
作者
Hadi, Hassan Jalil [1 ]
Cao, Yue [1 ]
Alshara, Mohammed Ali [2 ]
Ahmad, Naveed [2 ]
Riaz, Muhammad Saqib [2 ]
Li, Jun [3 ,4 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[2] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[3] Datang Internet Technol Wuhan Co Ltd, Wuhan, Peoples R China
[4] Hubei Engn Res Ctr Ind Internet Integrat Technol, Wuhan, Peoples R China
来源
DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023 | 2024年 / 571卷
关键词
Quantum Computing; Quantum Cryptography; Cyber Security; AES; Quantum Key Distribution (QKD); CYBERSECURITY;
D O I
10.1007/978-3-031-56583-0_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum computers pose a significant danger to cyber security. If major fault-tolerant, quantum computers are built, the most extensively used cryptography techniques would fail. The present level of analysis, in terms of quantum technologies and applications, is still in its infancy. The researchers have a hazy view of how to prepare for future quantum computing breakthroughs, particularly in cyber security. The powerful quantum computers capable of breaching current cryptography protections are yet a decade or more away. History has demonstrated that transitioning to quantum-resistant techniques for classical cryptography will most likely take a quantifiable amount of time. In this paper, a comparative analysis of modern cryptographic algorithms concerning quantum computing is performed and its impact on cyber security has been reviewed.
引用
收藏
页码:333 / 343
页数:11
相关论文
共 50 条
  • [41] CYBER SECURITY CHALLENGES OF DISTRIBUTED E- LEARNING SYSTEMS
    Bandara, I.
    Ioras, F.
    Maher, K.
    Lusuardi, C.
    INTED2015: 9TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2015, : 4605 - 4609
  • [42] Review of Cyber-Security Challenges and Measures in Smart Substation
    Cai, Jiran
    Zheng, Yongkang
    Zhou, Zhenyu
    2016 INTERNATIONAL CONFERENCE ON SMART GRID AND CLEAN ENERGY TECHNOLOGIES (ICSGCE), 2016, : 65 - 69
  • [43] Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?
    Hare, Forrest
    THE VIRTUAL BATTLEFIELD: PERSPECTIVES ON CYBER WARFARE, 2009, 3 : 88 - 105
  • [44] Challenges and Prospects of Cyber Security Protection for New Power System
    Zhou J.
    Zhang X.
    Shao L.
    Ying H.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2023, 47 (08): : 15 - 24
  • [45] Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures
    Mawgoud, Ahmed A.
    Taha, Mohamed Hamed N.
    Khalifa, Nour Eldeen M.
    Loey, Mohamed
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 912 - 921
  • [46] Mitigating 5G security challenges for next-gen industry using quantum computing
    Mangla, Cherry
    Rani, Shalli
    Qureshi, Nawab Muhammad Faseeh
    Singh, Aman
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (06)
  • [47] Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
    Ahmad, Waqas
    Rasool, Aamir
    Javed, Abdul Rehman
    Baker, Thar
    Jalil, Zunera
    ELECTRONICS, 2022, 11 (01)
  • [48] A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing
    Kakkad, Vishruti
    Shah, Hitarth
    Patel, Reema
    Doshi, Nishant
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 680 - 685
  • [49] A quantum-based approach for offensive security against cyber attacks in electrical infrastructure
    Lakshmi, D.
    Nagpal, Neelu
    Chandrasekaran, S.
    Hemanth, D. Jude
    APPLIED SOFT COMPUTING, 2023, 136