Cybersecurity and Cryptography: The New Era of Quantum Computing

Mmaduekwe, Ugochukwu and Mmaduekwe, Ebuka (2024) Cybersecurity and Cryptography: The New Era of Quantum Computing. Current Journal of Applied Science and Technology, 43 (5). pp. 41-51. ISSN 2457-1024

[thumbnail of Mmaduekwe4352024CJAST116180.pdf] Text
Mmaduekwe4352024CJAST116180.pdf - Published Version

Download (529kB)

Abstract

Aim: This paper aims to examine the concepts of cybersecurity and cryptography with the advent of the current quantum computing.

Significance of Study: The numerous advantages attached to the use of the hyper-connected paradigm have given an inestimable and unavoidable value to its use. However, there is a need to protect information dissemination between parties to avoid the occurrence of catastrophic events that may come when an unauthorized party accesses this information. Thus, the use of quantum computing to improve the previously used cryptography for cybersecurity is very essential.

Problem Statement: In the past, cryptography was the adopted method to secure information in the cyber world thereby, preventing attack and also disallowing intruders from having access to secret information. However, the advent of quantum computing to improve the efficiency of cryptography has made its application very challenging due to its complex nature.

Discussion: An introduction to cryptography, cyber security, and quantum computing was executed. The mechanisms of cryptography in cyber security together with its transition into quantum cryptography were discussed. Characteristics of quantum information and quantum communication systems regarding typical examples were stated. Post-quantum cryptography as a means of handling the challenges accorded with the use of quantum cryptography was discussed. Finally, consideration was given to the development and applications of the SWOT framework for various kinds of cryptographic algorithms.

Conclusion: The use of quantum cryptography has found wide applications in cybersecurity. Also, post-quantum cryptography has been proven to be effective in handling issues arising from the use of quantum cryptography in securing information from being accessed by a third party.

Item Type: Article
Subjects: GO for STM > Multidisciplinary
Depositing User: Unnamed user with email support@goforstm.com
Date Deposited: 29 Apr 2024 08:01
Last Modified: 29 Apr 2024 08:01
URI: http://archive.article4submit.com/id/eprint/2804

Actions (login required)

View Item
View Item