Abstract
The twenty-first century cannot be imagined without ICT and the excessive use of the internet. Even more so in our current state of (post-) Covid. People work, communicate, and live online. For this reason, information security is more important than ever. However, the awareness regarding ICT related security threats have not increased significantly in the past decades. In present paper we introduce the traditional identification methodologies focusing on the computational capacity these require to be cracked, since the purpose is to demonstrate, how quantum computers will bring about a new era of encryption, where traditional methodologies will be easily cracked by brute force. In current paper we try to draw attention to the fact, that cryptography needs to undergo radical changes, in order to adapt to the coming challenges posed by quantum computers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
KSH Távközlés, televízió- és internetszolgáltatás – IKT-eszközök és használatuk a háztartásokban, a vállalkozásoknál és a közigazgatásban. https://www.ksh.hu/docs/hun/xftp/idoszaki/ikt/ikt17.pdf (2017)
KSH A háztartások információs- és kommunikációseszköz-használatának főbb jellemzői. https://www.ksh.hu/docs/hun/xftp/idoszaki/ikt/2020/01/index.html (2020)
Lazânyi, K., Vincze, A., Szikora, P.: The Digital Skills in the Hungarian Higher Education During the First Wave of Covid-19. Higher Education Policies for Developing Digital Skills to Respond to the Covid-19 Crisis: European and Global Perspectives, pp. 4–18 (2021)
KSH A háztartások információ- és kommunikációseszközök-használatának főbb jellemzői (2021)
Szűcs, E., Záhonyi, L.: Információbiztonság fejlődés-történeti vizsgálata–Mérföldkövek, események és válaszok. Biztonságtudományi Szemle. 3(3), 81–91 (2021)
Muha, L.: Az informatikai biztonság egy lehetséges rendszertana. Bolyai Szemle. 17(4), 137–156 (2008)
Nyikes, Z., Kovács, T.A., Tokody, D.: In situ testing of rail damages in accordance with Industry 4.0. J. Phys. Conf. Ser. (1742–6588 1742–6596). 1045, 1–6 (2018). https://doi.org/10.1088/1742-6596/1045/1/012032
Wang, B., Wu, C.: Safety informatics as a new, promising and sustainable area of safety science in the information age. J. Clean. Prod. 252(119852), 1–13 (2020)
Rana, T.A., Cheah, Y.N., Rana, T.: Multi-level knowledge-based approach for implicit aspect identification. Appl. Intell. 50(12), 4616–4630 (2020)
Keszthelyi, A.L.: Jelszavakról-iparági legrosszabb gyakorlatok = Passwords-worst practices in user authentication. Taylor. 7(3–4), 261–268 (2015)
Balázs, Á., Nyikes, Z., Kovács, T.A.: Building protection with composite materials application. Key Eng. Mater. (1013–9826 1662–9795). 755, 286–291 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.286
Földesi, K.: Paradigmaváltás a biztonságtechnikában – miért alkalmazzunk biometrikus rendszert? Magyar Rendészet. 15(3), 37–48 (2015)
Nyikes, Z.: Digital competence and the safety awareness base on the assessments results of the Middle East-European generations. Proc. Manuf. 2351–9789(22), 916–922 (2018). https://doi.org/10.1016/j.promfg.2018.03.130
Chang, Y.C.: The Many Faces of Adverse Possession: Economic and Empirical Analyses of Laws in 156 Jurisdictions. Available at SSRN:3558800 (2020)
O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE. 91(12), 2021–2040 (2003)
FEHÉR-POLGÁR Pál Felsőoktatásban tanuló hallgatók biztonságtudatossága. TAYLOR Gazdálkodás- és szervezéstudományi folyóirat, Szeged, 2015/3–4. szám pp. 15–17 (2015)
Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)
Nyikes, Z.: Contemporary digital competency review. Interdiscip. Descr. Complex Syst. (1334–4684 1334–4676). 16(1), 124–131 (2018). https://doi.org/10.7906/indecs.16.1.9
Tan, J., Bauer, L., Christin, N., Cranor, L.F.: Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1407–1426 (2020)
KÁDÁR Sándor: Többfaktoros azonosítás. 2017.04.22. https://nws.niif.hu/ncd2007/docs/phu/109.pdf (2007)
OLÁH Gábor Többlépcsős azonosítás amit mindenkinek használnia kell(ene). Golnet Informatika. https://golnet.hu/blog/biztonsag/tobblepcsos-azonositas-amit-mindenkinek-hasznalnia-kellene/ (2019)
KÖDMÖN József Jelszómenedzser szoftver alkalmazása az egészségügyben. 2016. 157. évfolyam, 52. szám. Orvosi Hetilap. Akadémia Kiadó. Debrecen. pp. 2066–2073 (2016)
Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Prentice Hall Press, Upper Saddle River (2010)
Nyikes, Z.: Creation proposal for the digital competency framework of the Middle-East European region. Key Eng. Mater. (1013–9826 1662–9795). 755, 106–111 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.106
Gosney, J.: Password cracking HPC. In: Passwords12 Conference, pp. 6–34 (2012)
Lozupone, V.: Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manag. 38(1), 42–44 (2018)
Lamport, L.: Password authentication with insecure communication. Commun. ACM. 24(11), 770–772 (1981)
Qu, H., Yan, Z., Lin, X.J., Zhang, Q., Sun, L.: Certificateless public key encryption with equality test. Inf. Sci. 462, 76–92 (2018)
Schnorr, C.P: Factoring Integers by CVP and SVP Algorithms (2017)
Maslov, D., Kim, J.S., Bravyi, S., Yoder, T.J., Sheldon, S.: Quantum advantage for computations with limited space. Nat. Phys. 17(8), 894–897 (2021)
Ladd, T.D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., O’Brien, J.L.: Quantum computers. Nature. 464(7285), 45–53 (2010)
Nyikes, Z.: Information security issues of RFID. In: Szakál, A. (ed.) SAMI 2016: IEEE 14th International Symposium on Applied Machine Intelligence and Informatics 2016, pp. 111–114. IEEE, New York (2016) ISBN:9781467387392
DiVincenzo, D.P., Loss, D.: Quantum computers and quantum coherence. J. Magn. Magn. Mater. 200(1–3), 202–218 (1999)
Valiev, K.A.: Quantum computers and quantum computations. Phys. Uspekhi. 48(1), 1 (2005)
McGeoch, C., Farré, P.: The D-Wave Advantage System: An Overview. D-Wave Systems Inc, Burnaby (2020)
Gill, S.S., Kumar, A., Singh, H., Singh, M., Kaur, K., Usman, M., Buyya, R.: Quantum computing: a taxonomy, systematic review and future directions. Softw. Pract. Exp. 52(1), 66–114 (2022)
Abura’ed, N., Khan, F.S., Bhaskar, H.: Advances in the quantum theoretical approach to image processing applications. ACM Comput. Surv. (CSUR). 49(4), 1–49 (2017)
Rieffel, E., Polak, W.: An introduction to quantum computing for non-physicists. ACM Comput. Surv. (CSUR). 32(3), 300–335 (2000)
Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Postquantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. 51(6), 1–41 (2019)
Ott, D., Peikert, C.: Identifying research challenges in post quantum cryptography migration and cryptographic agility. arXiv, 1909.07353 (2019)
Tsai, C.W., Yang, C.W., Lin, J., Chang, Y.C., Chang, R.S.: Quantum key distribution networks: challenges and future research issues in security. Appl. Sci. 11(9), 3767 (2021)
Mastriani, M., Iyengar, S.S., Kumar, L.: Satellite quantum communication protocol regardless of the weather. Opt. Quantum Electron. 53(4), 1–14 (2021)
Conrad, A., Hill, A., Chaffee, D., Herndon, K., Wilens, B., Sanchez-Rosales, D., Gauthier, D., Kwiat, P.: Drone-based quantum key distribution. In: APS Division of Atomic, Molecular and Optical Physics Meeting Abstracts, vol. 2019, p. P08–003 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature B.V.
About this paper
Cite this paper
Szikora, P., Lazányi, K. (2022). The End of Encryption? – The Era of Quantum Computers. In: Kovács, T.A., Nyikes, Z., Fürstner, I. (eds) Security-Related Advanced Technologies in Critical Infrastructure Protection. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2174-3_5
Download citation
DOI: https://doi.org/10.1007/978-94-024-2174-3_5
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-024-2173-6
Online ISBN: 978-94-024-2174-3
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)