Quantum Computing and Its Impact on Cryptography the Future of Secure Communication
Keywords:
Quantum Computing, Cryptography, Shor’s Algorithm, Post-Quantum Cryptography, Secure Communication, RSA, Quantum Threat, Quantum Key DistributionAbstract
Traditional public key cryptography becomes vulnerable because it depends on mathematical hardness assumptions such as factorization and discrete logarithms yet Shor’s algorithm and other quantum algorithms defeat these assumptions. Research performed on current literature in conjunction with quantum-resistant algorithm progress establishes the immediate requirement for moving toward systems protected from quantum attacks. An analysis along with simulation of algorithmic resilience helps understand future secure communication patterns
Downloads
Metrics
References
Abuarqoub, S. Abuarqoub, A. Alzu’bi, and A. Muthanna, “The impact of quantum computing on security in emerging technologies,” The 5th International Conference on Future Networks &Amp; Distributed Systems, pp. 171–176, Dec. 2021, doi: 10.1145/3508072.3508099.
F. Cavaliere, J. Mattsson, and B. Smeets, “The security implications of quantum cryptography and quantum computing,” Network Security, vol. 2020, no. 9, pp. 9–15, Sep. 2020, doi: 10.1016/s1353-4858(20)30105-7.
N. R. A. Jowarder and N. S. Jahan, “Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection,” World Journal of Advanced Engineering Technology and Sciences, vol. 13, no. 1, pp. 330–339, Sep. 2024, doi: 10.30574/wjaets.2024.13.1.0421.
F. Arute et al., “Quantum supremacy using a programmable superconducting processor,” Nature, vol. 574, no. 7779, pp. 505–510, Oct. 2019, doi: 10.1038/s41586-019-1666-5.
D. Moody et al., “Status report on the second round of the NIST post-quantum cryptography standardization process,” Jul. 2020. doi: 10.6028/nist.ir.8309.
K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical Review Letters, vol. 67, no. 6, pp. 661–663, Aug. 1991, doi: 10.1103/physrevlett.67.661.
N. Sood, “Cryptography in post Quantum computing era,” SSRN Electronic Journal, Jan. 2024, doi: 10.2139/ssrn.4705470.
S. K. Sahu and K. Mazumdar, “State-of-the-art analysis of quantum cryptography: applications and future prospects,” Frontiers in Physics, vol. 12, Aug. 2024, doi: 10.3389/fphy.2024.1456491.
J.-P. Aumasson, “The impact of quantum computing on cryptography,” Computer Fraud & Security, vol. 2017, no. 6, pp. 8–11, Jun. 2017, doi: 10.1016/s1361-3723(17)30051-9.
N. Durr-E-Shahwar, M. Imran, A. B. Altamimi, W. Khan, S. Hussain, and M. Alsaffar, “Quantum Cryptography for Future Networks Security: A Systematic Review,” IEEE Access, vol. 12, pp. 180048–180078, Jan. 2024, doi: 10.1109/access.2024.3504815.
M. Victor, D. D. W. Praveenraj, S. R, A. Alkhayyat, and A. Shakhzoda, “Cryptography: Advances in secure communication and data protection,” E3S Web of Conferences, vol. 399, p. 07010, Jan. 2023, doi: 10.1051/e3sconf/202339907010.
Sibi, “The impact of quantum computing on cryptography,” International Journal for Research in Applied Science and Engineering Technology, vol. 11, no. 3, pp. 1762–1765, Mar. 2023, doi: 10.22214/ijraset.2023.49770.
N. E. O. Sodiya, N. U. J. Umoga, N. O. O. Amoo, and N. A. Atadoga, “Quantum computing and its potential impact on U.S. cybersecurity: A review: Scrutinizing the challenges and opportunities presented by quantum technologies in safeguarding digital assets,” Global Journal of Engineering and Technology Advances, vol. 18, no. 2, pp. 049–064, Feb. 2024, doi: 10.30574/gjeta.2024.18.2.0026.
J. K. Manda, “Quantum-Safe Cryptography for Telecom Networks: Implementing Post-Quantum Cryptography Solutions to Protect Telecom Networks Against Future Quantum Computing Threats ,” SSRN Electronic Journal, Jan. 2025, doi: 10.2139/ssrn.5136797.
M. A. Akbar, A. A. Khan, and S. Hyrynsalmi, “Role of quantum computing in shaping the future of 6 G technology,” Information and Software Technology, vol. 170, p. 107454, Mar. 2024, doi: 10.1016/j.infsof.2024.107454
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.