Mmaduekwe, Ugochukwu and Mmaduekwe, Ebuka (2024) Cybersecurity and Cryptography: The New Era of Quantum Computing. Current Journal of Applied Science and Technology, 43 (5). pp. 41-51. ISSN 2457-1024
Mmaduekwe4352024CJAST116180.pdf - Published Version
Download (529kB)
Abstract
Aim: This paper aims to examine the concepts of cybersecurity and cryptography with the advent of the current quantum computing.
Significance of Study: The numerous advantages attached to the use of the hyper-connected paradigm have given an inestimable and unavoidable value to its use. However, there is a need to protect information dissemination between parties to avoid the occurrence of catastrophic events that may come when an unauthorized party accesses this information. Thus, the use of quantum computing to improve the previously used cryptography for cybersecurity is very essential.
Problem Statement: In the past, cryptography was the adopted method to secure information in the cyber world thereby, preventing attack and also disallowing intruders from having access to secret information. However, the advent of quantum computing to improve the efficiency of cryptography has made its application very challenging due to its complex nature.
Discussion: An introduction to cryptography, cyber security, and quantum computing was executed. The mechanisms of cryptography in cyber security together with its transition into quantum cryptography were discussed. Characteristics of quantum information and quantum communication systems regarding typical examples were stated. Post-quantum cryptography as a means of handling the challenges accorded with the use of quantum cryptography was discussed. Finally, consideration was given to the development and applications of the SWOT framework for various kinds of cryptographic algorithms.
Conclusion: The use of quantum cryptography has found wide applications in cybersecurity. Also, post-quantum cryptography has been proven to be effective in handling issues arising from the use of quantum cryptography in securing information from being accessed by a third party.
Item Type: | Article |
---|---|
Subjects: | GO for STM > Multidisciplinary |
Depositing User: | Unnamed user with email support@goforstm.com |
Date Deposited: | 29 Apr 2024 08:01 |
Last Modified: | 29 Apr 2024 08:01 |
URI: | http://archive.article4submit.com/id/eprint/2804 |