A Review on Quantum Computing and Security

A Review on Quantum Computing and Security

K. Muthumanickam, P. C. Senthil Mahesh, Mahmoud Ragab
Copyright: © 2023 |Pages: 19
ISBN13: 9781668466971|ISBN10: 166846697X|EISBN13: 9781668466988
DOI: 10.4018/978-1-6684-6697-1.ch005
Cite Chapter Cite Chapter

MLA

Muthumanickam, K., et al. "A Review on Quantum Computing and Security." Handbook of Research on Quantum Computing for Smart Environments, edited by Amit Kumar Tyagi, IGI Global, 2023, pp. 84-102. https://doi.org/10.4018/978-1-6684-6697-1.ch005

APA

Muthumanickam, K., Mahesh, P. C., & Ragab, M. (2023). A Review on Quantum Computing and Security. In A. Tyagi (Ed.), Handbook of Research on Quantum Computing for Smart Environments (pp. 84-102). IGI Global. https://doi.org/10.4018/978-1-6684-6697-1.ch005

Chicago

Muthumanickam, K., P. C. Senthil Mahesh, and Mahmoud Ragab. "A Review on Quantum Computing and Security." In Handbook of Research on Quantum Computing for Smart Environments, edited by Amit Kumar Tyagi, 84-102. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6697-1.ch005

Export Reference

Mendeley
Favorite

Abstract

Modern encryption methods are built upon the fundamentally “uncomfortable” process of computing huge integers to their primes. However, current cryptography is vulnerable to both increases in processing power and the emergence of quickly reversing huge integer factorization in mathematics. Therefore, incorporating quantum physics into encryption is the solution, which leads to an assessment of quantum cryptography. The field of cryptography and security is undergoing significant change as a result of the potential of scalable quantum computing. In this theoretical paper, the authors examine the development of quantum computing. The authors continue by listing the current threats to cryptographic primitives. Readers can deduce knowledge of a variety of topics from this review article, including risks posed by quantum technologies to traditional cryptography, modern cryptography – private key cryptography, post-quantum cryptography, quantum key distribution, and effects on hash functions and post-quantum cryptography.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.