0% found this document useful (0 votes)
0 views1 page

Abstract Quantum Computing

The document discusses the significant challenges that quantum computing poses to cybersecurity, particularly its threat to traditional cryptographic techniques such as RSA and ECC. It highlights the need for post-quantum cryptography (PQC) and secure key distribution systems like Quantum Key Distribution (QKD) to ensure data security and system integrity. The study emphasizes the importance of developing quantum-aware security policies and coordinated strategies across various frameworks to adapt to this paradigm shift in computing.

Uploaded by

manasaveena.t
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views1 page

Abstract Quantum Computing

The document discusses the significant challenges that quantum computing poses to cybersecurity, particularly its threat to traditional cryptographic techniques such as RSA and ECC. It highlights the need for post-quantum cryptography (PQC) and secure key distribution systems like Quantum Key Distribution (QKD) to ensure data security and system integrity. The study emphasizes the importance of developing quantum-aware security policies and coordinated strategies across various frameworks to adapt to this paradigm shift in computing.

Uploaded by

manasaveena.t
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Implications of Quantum Computing for

Cybersecurity
Adapa Soujanya , Katuri Chandrika,
Student, Student ,
Dept of AIML , Dept of AIML ,
NRIIT-Pothavarapadu , NRIIT-Pothavarapadu ,
sowjanyaadapa07@gmail.com. Katurichandrika20@gmail.com.

Abstract - In the future decades, cybersecurity will face a number of obstacles. Perhaps the
most difficult of these issues is quantum computing. Typically, cybersecurity offers methods,
guidelines, rules, setups, and suggestions to safeguard traditional system components.
Vulnerability can arise anywhere and at any time, according to the CIA triad (Confidentiality,
Integrity, and Availability) principles and the current domain structures utilised in traditional
IT infrastructure systems. A paradigm shift in computing power, quantum computing has
significant ramifications for contemporary cybersecurity. In contrast to traditional computers,
quantum systems use quantum parallelism, entanglement, and superposition to do some
computations tenfold more quickly. This directly threatens commonly used public-key
cryptographic techniques like RSA, ECC, and DH, which are essential for secure
communication, authentication, and digital signatures. Shor's method, for example, can
efficiently factor huge numbers and calculate discrete logarithms, making these cryptosystems
susceptible. Grover's approach can also undermine symmetric key encryption by reducing
brute-force complexity, necessitating longer key lengths for AES and other comparable
algorithms. The integration of quantum technology into cybersecurity infrastructure will
necessitate the creation and use of post-quantum cryptography (PQC) algorithms that are
resistant to quantum attacks. Furthermore, secure key distribution systems, such as Quantum
Key Distribution (QKD), provide theoretically unbreakable communication but present new
issues in terms of scalability, hardware requirements, and standardisation. This study
investigates the technical implications of quantum computing for current cybersecurity models,
assesses the development of quantum-resistant solutions, and emphasises the critical need for
quantum-aware security policies and migration plans. To guarantee long-term data security and
system integrity, the shift to a post-quantum future necessitates a coordinated strategy across
software, hardware, and legal frameworks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy