Quantum Computing Challenges and Impact on Cyber Security

被引:1
|
作者
Hadi, Hassan Jalil [1 ]
Cao, Yue [1 ]
Alshara, Mohammed Ali [2 ]
Ahmad, Naveed [2 ]
Riaz, Muhammad Saqib [2 ]
Li, Jun [3 ,4 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[2] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[3] Datang Internet Technol Wuhan Co Ltd, Wuhan, Peoples R China
[4] Hubei Engn Res Ctr Ind Internet Integrat Technol, Wuhan, Peoples R China
关键词
Quantum Computing; Quantum Cryptography; Cyber Security; AES; Quantum Key Distribution (QKD); CYBERSECURITY;
D O I
10.1007/978-3-031-56583-0_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum computers pose a significant danger to cyber security. If major fault-tolerant, quantum computers are built, the most extensively used cryptography techniques would fail. The present level of analysis, in terms of quantum technologies and applications, is still in its infancy. The researchers have a hazy view of how to prepare for future quantum computing breakthroughs, particularly in cyber security. The powerful quantum computers capable of breaching current cryptography protections are yet a decade or more away. History has demonstrated that transitioning to quantum-resistant techniques for classical cryptography will most likely take a quantifiable amount of time. In this paper, a comparative analysis of modern cryptographic algorithms concerning quantum computing is performed and its impact on cyber security has been reviewed.
引用
收藏
页码:333 / 343
页数:11
相关论文
共 50 条
  • [21] Cyber resilience and cyber security issues of intelligent cloud computing systems
    Abdullayeva, Fargana
    RESULTS IN CONTROL AND OPTIMIZATION, 2023, 12
  • [22] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [23] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [24] Cloud Computing and Security Challenges
    Yu, Huiming
    Powell, Nakia
    Stembridge, Dexter
    Yuan, Xiaohong
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [25] The security challenges of ubiquitous computing
    Stajano, F
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
  • [26] Managing Cyber Security with Quantum Techniques
    Bishwas, Arit Kumar
    Advani, Jai
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 991 - 997
  • [27] Cyber security challenges in Smart Cities: Safety, security and privacy
    Elmaghraby, Adel S.
    Losavio, Michael M.
    JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 491 - 497
  • [28] Cyber security in the Smart Grid: Survey and challenges
    Wang, Wenye
    Lu, Zhuo
    COMPUTER NETWORKS, 2013, 57 (05) : 1344 - 1371
  • [29] Mobile Devices and Cyber Security An Exploratory Study on User's Response to Cyber Security Challenges
    Kauthamy, Kanthithasan
    Ashrafi, Noushin
    Kuilboer, Jean-Pierre
    WEBIST: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2017, : 306 - 311
  • [30] Security Challenges & Controls in Cyber Physical System
    Rathi, Rajat
    Sharma, Nikhil
    Manchanda, Chinkit
    Bhushan, Bharat
    Grover, Moksh
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 242 - 247