9Quantum Computing Based on Cybersecurity

P. William1*, Vivek Parganiha2 and D.B. Pardeshi3

1Department of Information Technology, Sanjivani College of Engineering, SPPU, Pune, India

2Department of Computer Science Engineering, Bhilai Institute of Technology, CSVTU, Bhilai, India

3Department of Electrical Engineering, Sanjivani College of Engineering, SPPU, Pune, India


As the race to develop practical quantum computers heats up, businesses, academic institutions, and research organisations working in the field may find themselves the focus of increasingly sophisticated cyberattacks for espionage, economic gain, and other nefarious purposes. As a consequence of the proliferation of quantum applications, conventional commercial information systems and services are rapidly approaching the point at which they will be required to protect their networks, software, hardware, and data from being subjected to digital assaults. This is the case as a result of the fact that quantum applications have been expanding. In this paper, we take a look at the present level of quantum computing as well as the risks that are associated with the emergence of this new area. We next proceed to describe potential attack vectors against quantum computing systems and the countermeasures, precautions, and best practises that can be taken to protect against them. After that, we propose suggestions for proactively reducing the cyberattack surface through threat intelligence and by ensuring the ...

Get Quantum Computing in Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.