0% found this document useful (0 votes)
21 views3 pages

The Future of Quantum Computing in Cryptography

Uploaded by

Tiwari Kuldeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

The Future of Quantum Computing in Cryptography

Uploaded by

Tiwari Kuldeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

The Future of Quantum Computing in Cryptography

1. Significance of Literature Review


A literature review plays a vital role in the scientific research process. It allows researchers
to understand the current state of knowledge in a specific field, identify gaps, and pinpoint
areas requiring further investigation. By surveying existing literature, one can:
 Develop a strong foundation for research by building on established studies.
 Avoid duplication of efforts by focusing on unexplored aspects.
 Gain insights into methodologies, challenges, and advancements in the field.
 Establish a clear understanding of the relevance and impact of the research topic.
In the context of quantum computing and cryptography, a literature review helps identify
the transformative potential of quantum technologies while exploring the vulnerabilities of
classical encryption methods.

2. Literature Sources and State of the Art


Topic: The Future of Quantum Computing in Cryptography
a) Literature Sources
1. Shor’s Algorithm and Its Impact on Cryptography
o Author: Peter W. Shor
o Source: SIAM Journal on Computing (1994)
o Overview: Introduces Shor’s algorithm, demonstrating how quantum
computers can efficiently factorize large integers, breaking RSA encryption.
2. Quantum Key Distribution (QKD): A Practical Approach
o Author: Artur Ekert
o Source: Physical Review Letters (1991)
o Overview: Discusses QKD protocols like BB84 and E91, providing a foundation
for secure communication in a quantum world.
3. Advancements in Quantum-Resistant Cryptography
o Author: Michele Mosca
o Source: NIST Post-Quantum Cryptography Reports (2021)
o Overview: Explores cryptographic algorithms designed to resist quantum
attacks, such as lattice-based and hash-based encryption.
4. Progress in Quantum Hardware for Cryptographic Applications
o Author: John Preskill
o Source: Annual Review of Physics (2018)
o Overview: Examines the development of quantum computers and their
implications for cryptographic systems.
5. Future Directions in Post-Quantum Cryptography
o Author: Daniel J. Bernstein
o Source: Journal of Cryptographic Engineering (2022)
o Overview: Reviews the transition strategies for cryptographic systems in
anticipation of quantum threats.
b) Summary of the Literature
1. Shor’s Algorithm demonstrated that RSA encryption, the backbone of current
cryptographic systems, could be compromised by quantum computers capable of
efficient integer factorization. This algorithm has catalyzed the search for quantum-
resistant solutions.
2. Quantum Key Distribution (QKD) protocols, such as BB84 and E91, offer secure
methods for encryption by leveraging the principles of quantum mechanics, such as
superposition and entanglement. These protocols are already being implemented in
practical systems.
3. Post-Quantum Cryptography (PQC) involves the development of algorithms resistant
to quantum attacks. Lattice-based, code-based, and multivariate polynomial
cryptographic methods show promise in addressing vulnerabilities.
4. The rapid development of quantum hardware, particularly from companies like IBM
and Google, highlights the urgent need for adapting cryptographic systems. Quantum
supremacy milestones emphasize the looming threats to classical encryption.
5. Post-Quantum Transition strategies focus on hybrid approaches that combine
classical and quantum-resistant methods to ensure a smooth transition as quantum
computers become mainstream.

3. GAP Analysis and Future Scope


GAP’s Identified:
 Scalability of Quantum Key Distribution: Current QKD systems are limited by range
and infrastructure requirements, making global adoption challenging.
 Development of Quantum-Resistant Algorithms: While promising, PQC algorithms
are not yet standardized or universally adopted.
 Quantum Hardware Limitations: Despite progress, quantum computers capable of
breaking RSA-2048 encryption are still years away, providing a critical window for
preparedness.
Future Scope:
1. Expansion of Quantum Networks: Development of quantum repeaters and satellites
to extend QKD implementation across continents.
2. Standardization of PQC Algorithms: Efforts by organizations like NIST to finalize and
promote quantum-resistant cryptographic standards.
3. Integration of Hybrid Cryptosystems: Combining classical and quantum-resistant
methods to ensure backward compatibility and enhanced security.
4. Advancement in Quantum Hardware: Focus on error correction and scalability to
make quantum computers practical for cryptographic applications.

4. References
1. Shor, P. W. (1994). Algorithms for quantum computation: Discrete logarithms and
factoring. SIAM Journal on Computing.
2. Ekert, A. (1991). Quantum cryptography based on Bell’s theorem. Physical Review
Letters.
3. Mosca, M. (2021). Post-Quantum Cryptography: NIST’s Current Progress. NIST
Reports.
4. Preskill, J. (2018). Quantum Computing in the NISQ era and beyond. Annual Review of
Physics.
5. Bernstein, D. J. (2022). Strategies for the Post-Quantum Era. Journal of Cryptographic
Engineering.

You might also like