0% found this document useful (0 votes)
28 views

A Survey on Improving Cyber Security Encryption Methods Using Quantum Computing

This paper explores the impact of quantum computing on cybersecurity encryption methods, highlighting both vulnerabilities in traditional encryption techniques and the potential for quantum-resistant cryptographic solutions. It discusses Quantum Key Distribution (QKD) and post-quantum cryptography as essential advancements to secure data against quantum threats. The authors emphasize the need for proactive development of quantum-safe security frameworks to address the challenges posed by quantum computing.

Uploaded by

IJMSRT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

A Survey on Improving Cyber Security Encryption Methods Using Quantum Computing

This paper explores the impact of quantum computing on cybersecurity encryption methods, highlighting both vulnerabilities in traditional encryption techniques and the potential for quantum-resistant cryptographic solutions. It discusses Quantum Key Distribution (QKD) and post-quantum cryptography as essential advancements to secure data against quantum threats. The authors emphasize the need for proactive development of quantum-safe security frameworks to address the challenges posed by quantum computing.

Uploaded by

IJMSRT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Volume-3, Issue-5, May 2025 International Journal of Modern Science and Research Technology

ISSN No- 2584-2706

A Survey on Improving Cyber Security Encryption


Methods using Quantum Computing
Deepa Barethiya ; Priti Zanzad ; Nishad Kamlekar
Dept. of Master in Computer Application, GHRCEM, Nagpur, India

Abstract
This paper inspects the evolutionary impression of than traditional computers. For example, quantum
quantum computing on cybersecurity encryption computing has the power to transfiguring areas like
techniques. Quantum computing shows both cryptography, material science, and complex
ultimate and opportunities inside the area of system modeling [18]. The appearance of quantum
cybersecurity. classical encryption techniques, computing shows pattern shift in the landscape of
which depend on complex mathematical issues for infrastructure security. Quantum computing’s
security, are highly vulnerable to quantum remarkable suggestions penetrate every layer of
algorithms like as Shor’s and Grover’s algorithms, our digital infrastructure, releasing a shadow of
which can proficiently split these encryption plans. uncertainty over the realm of cyber security [13].
Although, quantum computing also simplifies the
growth of advanced encryption methods, as well as 2. Literature Review
Quantum Key Distribution (QKD) and post- In the domain of cybersecurity, encryption
quantum cryptographic algorithms, which provide techniques are necessary for protecting data
enhanced security opposed to quantum threats. In integrity and confidentiality. Encryption changes
this paper author discusses the impact of quantum readable data to an unreadable format using
computing on encryption, reviews ongoing study algorithms and keys, assuring that only permissible
into quantum-resistant cryptographic methods and parties can access the original information.
policies for applying quantum-safe security Encryption can be classified into two primary
frameworks to ensure powerful data encryption. types that are, symmetric and asymmetric
encryption. In symmetric encryption it utilizes the
Keywords: Quantum computing, encryption,
same key for both encryption and decryption
cybersecurity, quantum key distribution, post-
process of data, creating an efficient but requiring
quantum cryptography.
secure key distribution. Common symmetric
1. Introduction encryption algorithms consist the Advanced
Encryption Standard (AES) and Data Encryption
Quantum computing is become visible field that
Standard (DES). Asymmetric encryption, also
influence the concepts of quantum mechanics to
called as public-key encryption, utilizes a pair of
process information in elementally distinct ways
keys—a public key for encryption and a private
from traditional computers. Unlike traditional bits,
key for decryption—increasing security during
which can show either a 0 or a 1, quantum bits, or
data transmission over unsecured channels.
qubits, can live in a position of superposition,
Remarkable asymmetric encryption algorithms
meaning they can represent both 0 and
include RSA and Elliptic Curve Cryptography
1concurrently. This property, across with quantum
(ECC) [19]. Cybersecurity is the avoidance of any
involvement, permits quantum computers to
damage to electronic communication systems and
present some calculations much more effectively
services and the protection of information involved
along with containing integrity, availability,

IJMSRT25MAY047 www.ijmsrt.com 150


DOI: https://doi.org/10.5281/zenodo.15463011
Volume-3, Issue-5, May 2025 International Journal of Modern Science and Research Technology
ISSN No- 2584-2706
confidentiality, authentication and non-repudiation 3. Traditional Encryption And Quantum
[16]. Threats
The appearance of quantum computing poses Modern cryptographic systems depend on
important challenges to present encryption problems that are computationally complex for
techniques. Quantum algorithms, like Shor's traditional computers to solve. For instance, RSA
algorithm, can successfully solve problems such as encryption is depended on the complexity of
integer factorization, which supports the security integer factorization, while ECC based on the
of mostly used encryption methods like RSA. This complexity of the discrete logarithm problem.
potential threatens the effectiveness of traditional However, the introduction of quantum computing
encryption techniques, requiring the evolution of basically changes this landscape. Shor’s algorithm,
quantum-resistant cryptographic methods to ensure a quantum algorithm, can easily factor large
data security in a post-quantum world [20]. In integers, effectively breaking RSA encryption [3].
today’s dynamic digital world, cybersecurity is a Likewise, Grover’s algorithm can increase brute-
guard against increasing number of threats that force attacks on symmetric encryption systems,
come with technological advancements. decreasing the effective security of AES keys.
Cybersecurity protocols are essential in the current Research shows that with the advent of a
era because most digital systems, like distributed sufficiently large quantum computer, present
file systems, NoSQL databases, and Network- encryption techniques could be compromised in a
Attached Storage (NAS), are used to store matter of hours [4]. This highlights the intense
largeamounts of data [1]. requirement for quantum-resistant cryptographic
Quantum computers leverage the principles of solutions.
superposition and entanglement to perform
difficult calculations at an exponentially faster rate 4. Quantum Key Distribution (Qkd)
as compared to traditional computers [2]. This Quantum Key Distribution (QKD) is a
computational power poses a fast risk to traditional revolutionary security technique that uses quantum
encryption systems but also introduces new techniques to improve secure communication.
security patterns. This paper aims to shows this QKD operates on the basis that measuring a
dual side, highlighting vulnerabilities in present quantum state improves its properties, through
encryption standards and developing the potential enabling the detection of any spy attempts. The
of quantum-resistant cryptographic techniques. BB84 protocol, introduced by Bennett and
Brassard in 1984, is the most broadly utilize QKD
protocol [5]. QKD ensures that any blocking of
quantum keys is instantly noticeable, thereby
creating secure communication channels feasible.
This method represents an important step towards
quantum-secure encryption systems and is being
actively explored in different research and
industrial applications.

5. Post-Quantum Cryptography (Pqc)


Post Quantum Cryptography is the area of
cryptography in which encryption algorithms are
created which are secure from an adversary with
quantum computers [7]. The main point of post-
Fig-1: Architecture of Quantum Computing quantum cryptography (also known quantum-
Platform [11] resistant cryptography) is to create cryptographic

IJMSRT25MAY047 www.ijmsrt.com 151


DOI: https://doi.org/10.5281/zenodo.15463011
Volume-3, Issue-5, May 2025 International Journal of Modern Science and Research Technology
ISSN No- 2584-2706
systems that are secure oppose to both quantum as control signals must be carefully chosen to achieve
well as classical computers, and can interoperate expected result [9]. Several Governments and
with available communications protocols and organizations are investing highly in quantum-
networks [4]. Quantum Cryptography is the resistant security infrastructures. Companies like
review of new cryptosystems which cannot be Google, IBM, and have been actively evolving
break by both quantum and traditional computers. quantum computing solutions, while researchers
The cryptosystems are classified into several work on hybrid cryptographic models that
families depend on the essential problem upon integrate traditional and quantum security.
which the security is renowned. These essential Although, the practical implementation of quantum
problems are believed to be impossible by both cryptographic methods comes with challenges:
traditional and quantum computers. The major • High-end technology: Quantum computing
families are lattice-based cryptography, isogeny- methods remains costly and not accessible for
based cryptography, non-commutative widespread deployment.
cryptography, code-based cryptography, hash- • Vulnerability to noise: Quantum systems are
based digital signatures, and multi-factor extremely vulnerable to environmental
cryptography [7]. disturbances, requiring error-correction
mechanisms.
6. Quantum Secret Sharing And Secure
Communications • Quantum network infrastructure: Creating a
secure quantum communication network requires
Quantum Secrete Sharing (QSS) is the outcome of
significant advancements in quantum networking
merging the principles of quantum mechanics with
techniques [10].
secret information distributing. It allows a sender
to exchange a secret among receivers, and the Government agencies and defense departments
receivers can then collectively recover the secret supervise difficult and different data, making them
when the requirement arises. To increase the primary purpose for strong quantum-based attacks.
practicality of these quantum protocols, As a preventive process, governments are
revolutionary idea of Quantum Anonymous Secret searching quantum-safe frameworks, like as hybrid
sharing (QASS) is advanced. To our knowledge, cryptographic systems adding both PQC and
sharing quantum information is also an essential traditional encryption for a gradual change [15].
branch of quantum secret sharing, and has the
same essential status as sharing traditional 8. Future Directions
information. Its important advantage is the ability With the ongoing development of quantum
to achieve direct sharing of quantum information, computers, the threat of decrypting vulnerable data
which is particularly essential for quantum encrypted using standard techniques develops
computing and quantum communication networks. significantly. This approaching threat highlights
[8]. QSS leverages the principles of quantum the need for the development of quantum-resistant
entanglement to gain heightened security in multi- encryption methods [11].
party communication environments, creating it an The development of cybersecurity in the quantum
essential component of future cryptographic age is a portrayal of ongoing modification and
systems. transformation. As digital methods have expert, so
too have the techniques and practices created to
7. Practical Implementations And Challenges preserve digital assets from unauthorized access
Quantum computations are physically realized via and cyber threats. This process from past to present
the time-progress of quantum systems steered by underscores the flexible interplay between
analog control signals. As quantum information is technological innovation and cybersecurity
preserved in regular amplitudes and phases, these approaches, particularly in the face of the quantum

IJMSRT25MAY047 www.ijmsrt.com 152


DOI: https://doi.org/10.5281/zenodo.15463011
Volume-3, Issue-5, May 2025 International Journal of Modern Science and Research Technology
ISSN No- 2584-2706
computing revolution [14]. As quantum methods Cryptographic Techniques: A Comprehensive
continue to develop, the pursuit of practical Survey on Cybersecurity in the Domain of
quantum computing uses and the conclusion of Machine/Deep Learning and Quantum
current challenges become crucial for Techniques”. 19 February 2024.
understanding the full power of quantum [2] M. A. Nielsen and I. L. Chuang, Quantum
computation. Continued research in quantum Computation and Quantum Information,
hardware focuses to address ongoing Cambridge University Press, 2010.
disadvantages and push the limits of quantum [3] L. K. Grover, “A fast quantum mechanical
computing capacities. Enhancing qubit coherence algorithm for database search,” Proceedings of the
times, decreasing error rates, enhancing qubit 28th Annual ACM Symposium on Theory of
connectivity are main objectives. Improvements in Computing, 1996, pp. 212-219.
materials science, engineering, and innovative [4] National Institute of Standards and
quantum architectures donate to the continue Technology, “Post-Quantum Cryptography: NIST
evolution of more robust quantum processors [12]. PQC Project,” 04-Mar-2025. Available:
As quantum computing proceeds to develop, the https://csrc.nist.gov/Projects/post-quantum-
requirement for quantum-resistant cryptographic cryptography
solutions turns into increasingly difficult. [5] C. H. Bennett and G. Brassard, “Quantum
Organizations must proactively change to post- cryptography: Public key distribution and coin
quantum cryptographic algorithms and detect tossing,” Proceedings of IEEE International
inquantum-secure communication methods. Conference on Computers, Systems, and Signal
Quantum computing (QC) is a develop and Processing, 1984, pp. 175-179.
increasingly growing domain. QC can potentially [6] National Security Agency (NSA), “Quantum-
decrypt RSA and ECC algorithms, influencing Resistant Cryptography Recommendations,” .
almost 100% of encrypted Internet traffic. Available: https://www.nsa.gov
Businesses around the world are spilling in [7] Ritik Bavdekar · Eashan Jayant Chopde ·
resources to additional QC knowledge and Ashutosh Bhatia · Kamlesh Tiwari, Sandeep
practices. [17]. Joshua Daniel · Atul, “Post Quantum
Cryptography: Techniques, Challenges,
9. Conclusion Standardization, and Directions for Future
In overview, the formation of quantum computing Research.
into cybersecurity offers a combination of [8] Guo-Dong Li, Wen-Chuan Cheng, Qing-Le
challenges and opportunities. To direct this Wang, Long Cheng, Ying Mao, and Heng-Yue Jia,
progressive era, it is essential to proactively gain “Quantum Secret Sharing Enhanced: Utilizing W
quantum-resistant cryptographic cures, encourage States for Anonymous and Secure Communication.
collaborative research, handle ethical concerns, [9] Google AI, “Quantum supremacy using a
and create comprehensive regulatory frameworks. programmable superconducting processor,”
The future of cybersecurity in the quantum age Nature, vol. 574, pp. 505-510, 2019.
will base on continuous evolution and a shared [10] IBM Research, “Building a Quantum-Safe
commitment to responsible approaches. By staying Cryptographic
attentive and working together, it can utilize the Future”.https://research.ibm.com/blog/new-
potential of quantum methods to enhance digital quantum-safe-standards-NIST
security while diminishing the risks they introduce [11] S. Singh and D. Kumar, “Enhancing Cyber
Security Using Quantum Computing and Artificial
9. References Intelligence: A Review,” June 3, 2024.
[1] Abid Mehmood (Member, IEEE), Arslan [12] O. A. Ajala, C. A. Arinze, O. C. Ofodile, C.
Shafique, Moatsum Alawida, and Abdul Nasir C. Okoye, and A. I. Daraojimba, “Exploring and
Khan. Advances and Vulnerabilities in Modern
IJMSRT25MAY047 www.ijmsrt.com 153
DOI: https://doi.org/10.5281/zenodo.15463011
Volume-3, Issue-5, May 2025 International Journal of Modern Science and Research Technology
ISSN No- 2584-2706
reviewing the potential of quantum computing in [17] Fazal Raheman, The Future of Cybersecurity
enhancing cybersecurity encryption methods,” in the Age of Quantum Computers . 16 November
Magna Scientia Advanced Research and Reviews, 2022.
vol. 10, no. 01, pp. 321–329, 2024. [18] IBM Research, “What is
[13] Y. Baseri, V. Chouhan, and A. Ghorbani, QuantumComputing?”
“Cybersecurity in the Quantum Era: Assessing the https://www.ibm.com/think/topics/quantum-
Impact of Quantum Computing on Infrastructure,” computing.
Apr. 16, 2024. [19] Splunk, “Data Encryption Methods & Types”.
[14] Enoch Oluwademilade Sodiya , Uchenna https://www.splunk.com/en_us/blog/learn/data-
Joseph Umoga , Olukunle Oladipupo Amoo and encryption-methods-types.html.
Akoh Atadoga , Quantum computing and its [20] IBM Research, “How Quantum Computing
potential impact on U.S. cybersecurity: A review: Will Impact
Scrutinizing the challenges and opportunities Cybersecurity.”https://www.ibm.com/think/topics/
presented by quantum technologies in safeguarding quantum-computing.
digital assets, 2024, 18(02), 049–064.
[15] S. Khan, P. Krishnamoorthy, M.Goswami, F.
M. Rakhimjonovna, S. A. Mohammed, and D.
Menaga, “Quantum Computing and Its
Implications for Cybersecurity: A Comprehensive
Review of Emerging Threats and Defenses,” vol.
1232–1248, 2024.
[16] A. Vaishnavi and S. Pillai, “Cybersecurity in
the Quantum Era—A Study of Perceived Risks in
Conventional Cryptography and Discussion on
Post Quantum Methods,” 1964 (2021) 042002.

IJMSRT25MAY047 www.ijmsrt.com 154


DOI: https://doi.org/10.5281/zenodo.15463011

You might also like