Skip to main content

Quantum Computing Challenges and Impact on Cyber Security

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2023)

Abstract

Quantum computers pose a significant danger to cyber security. If major fault-tolerant, quantum computers are built, the most extensively used cryptography techniques would fail. The present level of analysis, in terms of quantum technologies and applications, is still in its infancy. The researchers have a hazy view of how to prepare for future quantum computing breakthroughs, particularly in cyber security. The powerful quantum computers capable of breaching current cryptography protections are yet a decade or more away. History has demonstrated that transitioning to quantum-resistant techniques for classical cryptography will most likely take a quantifiable amount of time. In this paper, a comparative analysis of modern cryptographic algorithms concerning quantum computing is performed and its impact on cyber security has been reviewed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vaishnavi, A., Pillai, S.: Cybersecurity in the quantum era-a study of perceived risks in conventional cryptography and discussion on post quantum methods. J. Phys: Conf. Ser. 1964, 042002 (2021). https://doi.org/10.1088/1742-6596/1964/4/042002

    Article  Google Scholar 

  2. Kirsch, Z.J., Ming, C.: Quantum computing: the risk to existing encryption methods (2015)

    Google Scholar 

  3. Mavroeidis, V., et al.: The impact of quantum computing on present cryptography. arXiv preprint arXiv:1804.00200 (2018)

  4. Arslan, B., et al.: A study on the use of quantum computers, risk assessment, and security problems. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE (2018)

    Google Scholar 

  5. Mosca, M.: Cybersecurity in an era with quantum computers: will we be ready? IEEE Secur. Priv. 16(5), 38–41 (2018)

    Article  Google Scholar 

  6. Wallden, P., Kashefi, E.: Cyber security in the quantum era. Commun. ACM 62(4), 120–120 (2019)

    Article  Google Scholar 

  7. Nafis, N.M.: Quantum computing era in perspective of cyber security. No. 4012. EasyChair (2020). Wang, Lidong, and Cheryl Ann

    Google Scholar 

  8. Alexander. Cyber security during the COVID-19 pandemic. AIMS Electron. Electr. Eng. 5(2), 146–157 (2021)

    Google Scholar 

  9. Kania, E.B., Costello, J.K.: Quantum technologies, US-China strategic competition, and future dynamics of cyber stability. In: 2017 International Conference on Cyber Conflict (CyCon US). IEEE (2017)

    Google Scholar 

  10. Riedel, M.F., Binosi, D., Thew, R., Calarco, T.: The European quantum technologies flagship program. Quantum Sci. Technol. 2(3), 030501 (2017)

    Article  Google Scholar 

  11. Djordjevic, I.B.: Cluster states-based quantum networks. In: IEEE Photonics Conference (IPC), vol. 2020, pp. 1–2 (2020). https://doi.org/10.1109/IPC47351.2020.9252479

  12. Ji, Z., Zhang, H., Wang, H.: Quantum private comparison protocols with several multi-particle entangled states. IEEE Access 7, 44613–44621 (2019). https://doi.org/10.1109/ACCESS.2019.2906687

    Article  Google Scholar 

  13. AL-Mubayedh, D., AL-Khalis, M., AL-Azman, G., AL-Abdali, M., Al Fosail, M., Nagy, N.: Quantum cryptography on IBM QX. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6 (2019). https://doi.org/10.1109/CAIS.2019.8769567

  14. Ul Ain, N.: A novel approach for secure multi-party secret sharing scheme via quantum cryptography. In: 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), pp. 112–116 (2017). https://doi.org/10.1109/C-CODE.2017.7918912

  15. Ford, P.: The quantum cybersecurity threat may arrive sooner than you think. Computer 56(2), 134–136 (2023). https://doi.org/10.1109/MC.2022.3227657

  16. Lakshmi, D., Nagpal, N., Chandrasekaran, S.: A quantum-based approach for offensive security against cyber attacks in electrical infrastructure. Appl. Soft Comput. 136, 110071 (2023)

    Article  Google Scholar 

  17. Dwivedi, A., Saini, G.K., Musa, U.I., Kunal.: Cybersecurity and prevention in the quantum era. In: 2023 2nd International Conference for Innovation in Technology (INOCON), pp. 1–6. Bangalore (2023). https://doi.org/10.1109/INOCON57975.2023.10101186.

  18. Csenkey, K., Bindel, N.: Post-quantum cryptographic assemblages and the governance of the quantum threat. J. Cybersecur. 9(1), tyad001 (2023)

    Google Scholar 

  19. Fernández Pérez, I., Prieta, F.D.L., Rodríguez-González, S., Corchado, J.M., Prieto, J.: Quantum AI: achievements and challenges in the interplay of quantum computing and artificial intelligence. In: Julián, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds.) ISAml 2022. LNNS, vol. 603, pp. 155–166. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-22356-3_15

    Chapter  Google Scholar 

Download references

Acknowledgement

The authors would like to thanks Prince Sultan University for the support by paying the registration fees of this article. This work is supported in part by the Wuhan AI Innovation Program (Grant No. 2023010402040020) and the Hubei Province Key Research and Development Program (Grant No. 2021AAA007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Cao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hadi, H.J., Cao, Y., Alshara, M.A., Ahmad, N., Riaz, M.S., Li, J. (2024). Quantum Computing Challenges and Impact on Cyber Security. In: Goel, S., Nunes de Souza, P.R. (eds) Digital Forensics and Cyber Crime. ICDF2C 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 571. Springer, Cham. https://doi.org/10.1007/978-3-031-56583-0_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56583-0_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56582-3

  • Online ISBN: 978-3-031-56583-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics