Research Article
Encryption and Decryption Technology for Quantum Computing
More Detail
1 Gyeonggi Global School; Goyang 10407, Korea2 Saint John's High School; Shrewsbury 01545 USA; 3 FAYSTON Preparatory; Yongin 16802, Korea; * Corresponding Author
International Journal of Business Studies and Innovation, 4(3), 2024, 8-13, https://doi.org/10.35745/ijbsi2024v04.03.0002
Published: 31 October 2024
OPEN ACCESS 25 Views 20 Downloads
ABSTRACT
We review the development of quantum computing and its corresponding encryption technology in this technical paper. As quantum computing is developing, a new paradigm of encryption technology is required as existing technologies cannot secure data and communication against quantum attacks. Through a literature review, the status and direction of further development of related technologies are explored to provide a basis for improving the present encryption technology for quantum computing. There is still room for development which necessitates the collaboration of stakeholders in a global network. More advanced algorithms and cryptography are mandatory for using quantum computing which will bring revolutionary technological advancement. Based on this report, the following study to improve the present algorithm is planned to apply them to diverse areas.
CITATION (APA)
Lee, Y., Nam, T., & Yune, S. (2024). Encryption and Decryption Technology for Quantum Computing. International Journal of Business Studies and Innovation, 4(3), 8-13. https://doi.org/10.35745/ijbsi2024v04.03.0002
REFERENCES
- Aggarwal, D.; Brennen, G. K., Lee, T., & Santhaet, M. (2018). Quantum attacks on Bitcoin, and how to protect against them. Ledger, 3, 41–62. http://dx.doi.org/10.5195/LEDGER.2018.127.
- Ahmed, U., Sipola, T., & Hautamäki, J. (2024). Cyber Protection Applications of Quantum Computing: A Review. Proceedings of the 23rd European Conference on Cyber Warfare and Security, 23(1) https://doi.org/10.34190/eccws.23.1.2182.
- Analytics Insight. (2023). Quantum Computing Impact on Cybersecurity Sector. Available online: https://www.analyticsinsight.net/cyber-security/quantum-computing-impact-on-cybersecurity-sector. (accessed on September 22, 2024).
- Anderson, Margo. Quantum Cryptography Has Everyone Scrambling China, India, the EU, and the US are all pursuing divergent approaches. IEEE Spectrum. Available online: https://spectrum.ieee.org/quantum-key-distribution. (accessed on September 22, 2024).
- Arute, F.; Arya, K.; Babbush, R.; Bacon, D.; Bardin, Joseph C.; Barends, R.; Biswas, R.; Boixo, S.; Fernando G.S.L.; Buell, D. A. et al. (2019). Quantum supremacy using a programmable superconducting processor, Nature, 574(7779), 505–510. https://doi.org/10.1038/s41586-019-1666-5.
- Asif, Rameez. (2021). Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms. IoT, 2. 71–91. https://doi.org/10.3390/iot2010005
- Baseri, Yaser, Chouhan, Vikas, & Ghorba, Ali. Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure. https://doi.org/10.48550/arXiv.2404.10659.
- Bennett, Charles H., & Brassard, Gilles. (1984). Quantum Cryptography: Public Key Distribution and Coin Tossing. Theoretical Computer Science, 560, 75–179. http://dx.doi.org/10.1016/j.tcs.2011.08.039.
- Caltech. (2024). How Will Quantum Technologies Change Cryptography? Available online: https://scienceexchange.caltech.edu/topics/quantum-science-explained/quantum-cryptography. (accessed on September 22, 2024).
- Daemen, J., & Rijmen, V.. (2002). The Design of Rijndael. : AES - The Advanced Encryption Standard. Available online:http://dx.doi.org/10.1007/978-3-662-04722-4. (accessed on September 22, 2024).
- Di M.; Alberto, J., Karl, T., Ivano, A., Constantia, A., Srinivasan, B., Christian W., Borras, K., Carrazza, S., Crippa, A., et al. (2024). Quantum Computing for High-Energy Physics: State of the Art and Challenges. PRX Quantum: a Physical Review Journal, 5(3). https://link.aps.org/doi/10.1103/PRXQuantum.5.037001.
- Dwork, C., &Roth, Aaron. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science. 9(3-4), 211–407. https://doi.org/10.1561/0400000042.
- Eastlake, D. & T. Hansen, US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF). RFC 6234 2011. https://doi.org/10.17487/RFC6234.
- Feynman, Richard P. (1982). Simulating Physics with Computers. International Journal of Theoretical Physics, 21, 467–488. https://doi.org/10.1007/BF02650179.
- Flöther, Frederik F. (2023). The state of quantum computing applications in health and medicine. Research Directions: Quantum Technologies. http://dx.doi.org/10.1017/qut.2023.4.
- Fowler, Austin G., Mariantoni, Matteo, Martinis, John M., Cleland, & Andrew N. (2012). Surface codes: Towards practical large-scale quantum computation. Physical Review A, 86(3), 032324. http://dx.doi.org/10.1103/PhysRevA.86.032324.
- Advances and open problems in federated learning. Available online: https://www.researchgate.net/publication/337904104_Advances_and_Open_Problems_in_Federated_Learning . (accessed on September 22, 2024).
- IBM. A Brief History Of Cryptography: Sending Secret Messages Throughout Time. Available online: https://www.ibm.com/blog/cryptography-history/ (accessed on August 11, 2024).
- IBM. The Future of Computing Is Quantum-centric. Available online: https://www.ibm.com/roadmaps/quantum/. (accessed on August 11, 2024).
- Kirsch, Zachary J., & Chow, Ming. Quantum Computing: The Risk to Existing Encryption Methods. Available online: https://www.cs.tufts.edu/comp/116/archive/fall2015/zkirsch.pdf. (accessed on August 11, 2024).
- Koblitz, N. (1978). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209. https://doi.org/10.1090/S0025-5718-1987-0866109-5.
- Kurose, James, & Ross, Keith. Computer Networking: A Top-Down Approach. London, UK: Pearson.
- Lai, J., Yao, F., Wang, J., Zhang, M., Li, F., Zhao, W., & Zhang, H. (2023). Application and Development of QKD-Based Quantum Secure Communication, 25(4), 627. https://doi.org/10.3390/e25040627.
- National Academies of Sciences, Engineering, and Medicine. (2018). Encryption and Its Applications. In Decrypting the Encryption Debate: A Framework for Decision Makers. Available online: https://doi.org/10.17226/25010. (accessed on August 11, 2024).
- Pirandola, U.L; Stefano, A.; Banchi, L.; & Berta, M. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236. http://dx.doi.org/10.1364/AOP.361502
- Pixelplex. 9 Promising Quantum Computing Applications: Breaking Barriers in Scientific Research. Available online: https://pixelplex.io/blog/quantum-computing-applications/. (accessed on September 22, 2024).
- Preskill, John. Quantum computing in the NISQ era and beyond. Quantum 2018, 2, 79. http://dx.doi.org/10.22331/q-2018-08-06-79.
- Rivest, R.L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978, 21(2), 120–126. https://doi.org/10.1145/359340.359342.
- Savage, Neil. Keeping secrets in a quantum world: Cryptographers are preparing for new quantum computers that will break their ciphers. Available online: https://www.nature.com/articles/d41586-023-03336-4. (accessed on September 22, 2024).
- Schneier, Bruce. Lattice-Based Cryptosystems and Quantum Cryptanalysis. Communications of the ACM 2024. Available online: http://dx.doi.org/10.1145/3665224. (accessed on September 22, 2024).
- Shannon, C. E. (1949). Communication Theory of Secrecy Systems. The Bell System Technical Journal, 28(4), 656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.
- Shor Peter. (1997). Polynomial-time algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing. Available online: https://doi.org/10.1137/S0097539795293172 (accessed on September 22, 2024).
- Shor, Peter. (1994). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science, USA, November 22, 124–134.
- Singh, Manoj Kumar. (2022). Code-Based Cryptography: A Comparative Study of Key Sizes. In Advanced Communication and Intelligent Systems. Proceedings of ICACIS 2022 Communications in Computer and Information. R.N Science: Berlin/Heidelberg, Germany,https://doi.org/10.1007/978-3-031-25088-0_32.
- Stallings, William. (2003). Cryptography and Network Security: Principles and Practice. Available online: https://www.researchgate.net/publication/243772991_Cryptography_and_Network_Security_Principles_And_Practices. (accessed on September 22, 2024).
- Subramanian, R. B., Siva, T., Maheswari, P., Nithya, M., Girija, Karthikeyan, & T. Saraswathi, (2024). Quantum Computing: Unveiling the Paradigm Shift and Diverse Applications.Available online: http://doi.org/10.4018/979-8-3693-1168-4.ch006. (accessed on September 22, 2024).
- Sundar, K., S., Sasikumar, & C. Jayakumar, (2024). Efficient and Secure Long-Distance Quantum Key Distribution by using a Proxy Encryption Scheme. Multimedia Tools and Applications, 83, 80285–80298. https://doi.org/10.1007/s11042-024-18835-3.
- Terhal. (2015). Barbara Quantum error correction for quantum memories. Reviews of Modern Physics, 87(2), 307. http://dx.doi.org/10.1103/RevModPhys.87.307.
- Thales. A Brief History Of Encryption (And Cryptography). Available online: https://www.thalesgroup.com/en/markets/digital-identity-and-security/magazine/brief-history-encryption. (accessed on September 22, 2024).
- Toshiba. Quantum Key Distribution (QKD). Delivering Provably Secure Networking For The Quantum Computing Age. Available online: https://www.toshiba.eu/solutions/quantum/products/quantum-key-distribution/. (accessed on September 22, 2024).
- Wehner, Stephanie, Elkouss, Davis, & Hanson, Ronald. (2018). Quantum internet: A vision for the road ahead. Science, 362, 6412. https://doi.org/10.1126/science.aam9288.
- Yu, Y. (2021). Preface to Special Topic on Lattice-based Cryptography. National Science Review, 8(9), nwab154. https://doi.org/10.1093/nsr/nwab154.