22Quantum Computing in Data Security: A Critical Assessment

Sadullah Khan1*, Chintan Jain1, Sudhir Rathi2, Prakash Kumar Maravi3, Arun Jhapate4 and Divyani Joshi5

1Department of Computer Science Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India

2Faculty of CSE, Poornima University, Jaipur, India

3Computer Science and Engineering Department, Samrat Ashok Technological Institute Polytechnic College, Vidisha, India

4Computer Science and Engineering Department Sagar Institute of Research and Technology, Bhopal, India

5Department of Computer Science and Engineering, IPS Academy, Indore, India

Abstract

In many fields, such as data search from large data repositories, prime factorization, number theory, cybersecurity, polynomial evaluation, interpolation, machine learning, and artificial intelligence, highly intensive computing tasks are required. Quantum computing is an emerging technology that can perform these tasks. Any computational issue that can be resolved by a classical computer can also be resolved more effectively by a quantum computer. Out of all of these problem areas, network security is one where quantum computing is most directly related, with key management and distribution being its two main applications that are used in a variety of ways. The principles of quantum computing, as well as several key distribution strategies based on quantum computing, are briefly explained in this study. Moreover, this article focuses on computational engineering ...

Get Quantum Computing in Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.