A Survey on Improving Cyber Security Encryption Methods Using Quantum Computing
A Survey on Improving Cyber Security Encryption Methods Using Quantum Computing
Abstract
This paper inspects the evolutionary impression of than traditional computers. For example, quantum
quantum computing on cybersecurity encryption computing has the power to transfiguring areas like
techniques. Quantum computing shows both cryptography, material science, and complex
ultimate and opportunities inside the area of system modeling [18]. The appearance of quantum
cybersecurity. classical encryption techniques, computing shows pattern shift in the landscape of
which depend on complex mathematical issues for infrastructure security. Quantum computing’s
security, are highly vulnerable to quantum remarkable suggestions penetrate every layer of
algorithms like as Shor’s and Grover’s algorithms, our digital infrastructure, releasing a shadow of
which can proficiently split these encryption plans. uncertainty over the realm of cyber security [13].
Although, quantum computing also simplifies the
growth of advanced encryption methods, as well as 2. Literature Review
Quantum Key Distribution (QKD) and post- In the domain of cybersecurity, encryption
quantum cryptographic algorithms, which provide techniques are necessary for protecting data
enhanced security opposed to quantum threats. In integrity and confidentiality. Encryption changes
this paper author discusses the impact of quantum readable data to an unreadable format using
computing on encryption, reviews ongoing study algorithms and keys, assuring that only permissible
into quantum-resistant cryptographic methods and parties can access the original information.
policies for applying quantum-safe security Encryption can be classified into two primary
frameworks to ensure powerful data encryption. types that are, symmetric and asymmetric
encryption. In symmetric encryption it utilizes the
Keywords: Quantum computing, encryption,
same key for both encryption and decryption
cybersecurity, quantum key distribution, post-
process of data, creating an efficient but requiring
quantum cryptography.
secure key distribution. Common symmetric
1. Introduction encryption algorithms consist the Advanced
Encryption Standard (AES) and Data Encryption
Quantum computing is become visible field that
Standard (DES). Asymmetric encryption, also
influence the concepts of quantum mechanics to
called as public-key encryption, utilizes a pair of
process information in elementally distinct ways
keys—a public key for encryption and a private
from traditional computers. Unlike traditional bits,
key for decryption—increasing security during
which can show either a 0 or a 1, quantum bits, or
data transmission over unsecured channels.
qubits, can live in a position of superposition,
Remarkable asymmetric encryption algorithms
meaning they can represent both 0 and
include RSA and Elliptic Curve Cryptography
1concurrently. This property, across with quantum
(ECC) [19]. Cybersecurity is the avoidance of any
involvement, permits quantum computers to
damage to electronic communication systems and
present some calculations much more effectively
services and the protection of information involved
along with containing integrity, availability,