Skip to main content

The End of Encryption? – The Era of Quantum Computers

  • Conference paper
  • First Online:
Security-Related Advanced Technologies in Critical Infrastructure Protection

Abstract

The twenty-first century cannot be imagined without ICT and the excessive use of the internet. Even more so in our current state of (post-) Covid. People work, communicate, and live online. For this reason, information security is more important than ever. However, the awareness regarding ICT related security threats have not increased significantly in the past decades. In present paper we introduce the traditional identification methodologies focusing on the computational capacity these require to be cracked, since the purpose is to demonstrate, how quantum computers will bring about a new era of encryption, where traditional methodologies will be easily cracked by brute force. In current paper we try to draw attention to the fact, that cryptography needs to undergo radical changes, in order to adapt to the coming challenges posed by quantum computers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. KSH Távközlés, televízió- és internetszolgáltatás – IKT-eszközök és használatuk a háztartásokban, a vállalkozásoknál és a közigazgatásban. https://www.ksh.hu/docs/hun/xftp/idoszaki/ikt/ikt17.pdf (2017)

  2. KSH A háztartások információs- és kommunikációseszköz-használatának főbb jellemzői. https://www.ksh.hu/docs/hun/xftp/idoszaki/ikt/2020/01/index.html (2020)

  3. Lazânyi, K., Vincze, A., Szikora, P.: The Digital Skills in the Hungarian Higher Education During the First Wave of Covid-19. Higher Education Policies for Developing Digital Skills to Respond to the Covid-19 Crisis: European and Global Perspectives, pp. 4–18 (2021)

    Google Scholar 

  4. KSH A háztartások információ- és kommunikációseszközök-használatának főbb jellemzői (2021)

    Google Scholar 

  5. Szűcs, E., Záhonyi, L.: Információbiztonság fejlődés-történeti vizsgálata–Mérföldkövek, események és válaszok. Biztonságtudományi Szemle. 3(3), 81–91 (2021)

    Google Scholar 

  6. Muha, L.: Az informatikai biztonság egy lehetséges rendszertana. Bolyai Szemle. 17(4), 137–156 (2008)

    MathSciNet  Google Scholar 

  7. Nyikes, Z., Kovács, T.A., Tokody, D.: In situ testing of rail damages in accordance with Industry 4.0. J. Phys. Conf. Ser. (1742–6588 1742–6596). 1045, 1–6 (2018). https://doi.org/10.1088/1742-6596/1045/1/012032

    Article  Google Scholar 

  8. Wang, B., Wu, C.: Safety informatics as a new, promising and sustainable area of safety science in the information age. J. Clean. Prod. 252(119852), 1–13 (2020)

    Google Scholar 

  9. Rana, T.A., Cheah, Y.N., Rana, T.: Multi-level knowledge-based approach for implicit aspect identification. Appl. Intell. 50(12), 4616–4630 (2020)

    Article  Google Scholar 

  10. Keszthelyi, A.L.: Jelszavakról-iparági legrosszabb gyakorlatok = Passwords-worst practices in user authentication. Taylor. 7(3–4), 261–268 (2015)

    Google Scholar 

  11. Balázs, Á., Nyikes, Z., Kovács, T.A.: Building protection with composite materials application. Key Eng. Mater. (1013–9826 1662–9795). 755, 286–291 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.286

    Article  Google Scholar 

  12. Földesi, K.: Paradigmaváltás a biztonságtechnikában – miért alkalmazzunk biometrikus rendszert? Magyar Rendészet. 15(3), 37–48 (2015)

    Google Scholar 

  13. Nyikes, Z.: Digital competence and the safety awareness base on the assessments results of the Middle East-European generations. Proc. Manuf. 2351–9789(22), 916–922 (2018). https://doi.org/10.1016/j.promfg.2018.03.130

    Article  Google Scholar 

  14. Chang, Y.C.: The Many Faces of Adverse Possession: Economic and Empirical Analyses of Laws in 156 Jurisdictions. Available at SSRN:3558800 (2020)

    Google Scholar 

  15. O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE. 91(12), 2021–2040 (2003)

    Article  Google Scholar 

  16. FEHÉR-POLGÁR Pál Felsőoktatásban tanuló hallgatók biztonságtudatossága. TAYLOR Gazdálkodás- és szervezéstudományi folyóirat, Szeged, 2015/3–4. szám pp. 15–17 (2015)

    Google Scholar 

  17. Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)

    Article  Google Scholar 

  18. Nyikes, Z.: Contemporary digital competency review. Interdiscip. Descr. Complex Syst. (1334–4684 1334–4676). 16(1), 124–131 (2018). https://doi.org/10.7906/indecs.16.1.9

    Article  Google Scholar 

  19. Tan, J., Bauer, L., Christin, N., Cranor, L.F.: Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1407–1426 (2020)

    Chapter  Google Scholar 

  20. KÁDÁR Sándor: Többfaktoros azonosítás. 2017.04.22. https://nws.niif.hu/ncd2007/docs/phu/109.pdf (2007)

  21. OLÁH Gábor Többlépcsős azonosítás amit mindenkinek használnia kell(ene). Golnet Informatika. https://golnet.hu/blog/biztonsag/tobblepcsos-azonositas-amit-mindenkinek-hasznalnia-kellene/ (2019)

  22. KÖDMÖN József Jelszómenedzser szoftver alkalmazása az egészségügyben. 2016. 157. évfolyam, 52. szám. Orvosi Hetilap. Akadémia Kiadó. Debrecen. pp. 2066–2073 (2016)

    Google Scholar 

  23. Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Prentice Hall Press, Upper Saddle River (2010)

    Google Scholar 

  24. Nyikes, Z.: Creation proposal for the digital competency framework of the Middle-East European region. Key Eng. Mater. (1013–9826 1662–9795). 755, 106–111 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.106

    Article  Google Scholar 

  25. Gosney, J.: Password cracking HPC. In: Passwords12 Conference, pp. 6–34 (2012)

    Google Scholar 

  26. Lozupone, V.: Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manag. 38(1), 42–44 (2018)

    Article  Google Scholar 

  27. Lamport, L.: Password authentication with insecure communication. Commun. ACM. 24(11), 770–772 (1981)

    Article  Google Scholar 

  28. Qu, H., Yan, Z., Lin, X.J., Zhang, Q., Sun, L.: Certificateless public key encryption with equality test. Inf. Sci. 462, 76–92 (2018)

    Article  MathSciNet  Google Scholar 

  29. Schnorr, C.P: Factoring Integers by CVP and SVP Algorithms (2017)

    Google Scholar 

  30. Maslov, D., Kim, J.S., Bravyi, S., Yoder, T.J., Sheldon, S.: Quantum advantage for computations with limited space. Nat. Phys. 17(8), 894–897 (2021)

    Article  Google Scholar 

  31. Ladd, T.D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., O’Brien, J.L.: Quantum computers. Nature. 464(7285), 45–53 (2010)

    Article  ADS  Google Scholar 

  32. Nyikes, Z.: Information security issues of RFID. In: Szakál, A. (ed.) SAMI 2016: IEEE 14th International Symposium on Applied Machine Intelligence and Informatics 2016, pp. 111–114. IEEE, New York (2016) ISBN:9781467387392

    Google Scholar 

  33. DiVincenzo, D.P., Loss, D.: Quantum computers and quantum coherence. J. Magn. Magn. Mater. 200(1–3), 202–218 (1999)

    Article  ADS  Google Scholar 

  34. Valiev, K.A.: Quantum computers and quantum computations. Phys. Uspekhi. 48(1), 1 (2005)

    Article  ADS  Google Scholar 

  35. McGeoch, C., Farré, P.: The D-Wave Advantage System: An Overview. D-Wave Systems Inc, Burnaby (2020)

    Google Scholar 

  36. Gill, S.S., Kumar, A., Singh, H., Singh, M., Kaur, K., Usman, M., Buyya, R.: Quantum computing: a taxonomy, systematic review and future directions. Softw. Pract. Exp. 52(1), 66–114 (2022)

    Article  Google Scholar 

  37. Abura’ed, N., Khan, F.S., Bhaskar, H.: Advances in the quantum theoretical approach to image processing applications. ACM Comput. Surv. (CSUR). 49(4), 1–49 (2017)

    Article  Google Scholar 

  38. Rieffel, E., Polak, W.: An introduction to quantum computing for non-physicists. ACM Comput. Surv. (CSUR). 32(3), 300–335 (2000)

    Article  Google Scholar 

  39. Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Postquantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. 51(6), 1–41 (2019)

    Article  Google Scholar 

  40. Ott, D., Peikert, C.: Identifying research challenges in post quantum cryptography migration and cryptographic agility. arXiv, 1909.07353 (2019)

    Google Scholar 

  41. Tsai, C.W., Yang, C.W., Lin, J., Chang, Y.C., Chang, R.S.: Quantum key distribution networks: challenges and future research issues in security. Appl. Sci. 11(9), 3767 (2021)

    Article  Google Scholar 

  42. Mastriani, M., Iyengar, S.S., Kumar, L.: Satellite quantum communication protocol regardless of the weather. Opt. Quantum Electron. 53(4), 1–14 (2021)

    Article  Google Scholar 

  43. Conrad, A., Hill, A., Chaffee, D., Herndon, K., Wilens, B., Sanchez-Rosales, D., Gauthier, D., Kwiat, P.: Drone-based quantum key distribution. In: APS Division of Atomic, Molecular and Optical Physics Meeting Abstracts, vol. 2019, p. P08–003 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kornélia Lazányi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature B.V.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Szikora, P., Lazányi, K. (2022). The End of Encryption? – The Era of Quantum Computers. In: Kovács, T.A., Nyikes, Z., Fürstner, I. (eds) Security-Related Advanced Technologies in Critical Infrastructure Protection. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2174-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-94-024-2174-3_5

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-024-2173-6

  • Online ISBN: 978-94-024-2174-3

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics