Quantum Computing and Its Impact on Cryptography the Future of Secure Communication

Authors

  • Sudheer Nandi
  • Kalai Vani YS
  • Archana Bhat
  • G. Poshamallu
  • Sushil Shukla

Keywords:

Quantum Computing, Cryptography, Shor’s Algorithm, Post-Quantum Cryptography, Secure Communication, RSA, Quantum Threat, Quantum Key Distribution

Abstract

Traditional public key cryptography becomes vulnerable because it depends on mathematical hardness assumptions such as factorization and discrete logarithms yet Shor’s algorithm and other quantum algorithms defeat these assumptions. Research performed on current literature in conjunction with quantum-resistant algorithm progress establishes the immediate requirement for moving toward systems protected from quantum attacks. An analysis along with simulation of algorithmic resilience helps understand future secure communication patterns

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Abuarqoub, S. Abuarqoub, A. Alzu’bi, and A. Muthanna, “The impact of quantum computing on security in emerging technologies,” The 5th International Conference on Future Networks &Amp; Distributed Systems, pp. 171–176, Dec. 2021, doi: 10.1145/3508072.3508099.

F. Cavaliere, J. Mattsson, and B. Smeets, “The security implications of quantum cryptography and quantum computing,” Network Security, vol. 2020, no. 9, pp. 9–15, Sep. 2020, doi: 10.1016/s1353-4858(20)30105-7.

N. R. A. Jowarder and N. S. Jahan, “Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection,” World Journal of Advanced Engineering Technology and Sciences, vol. 13, no. 1, pp. 330–339, Sep. 2024, doi: 10.30574/wjaets.2024.13.1.0421.

F. Arute et al., “Quantum supremacy using a programmable superconducting processor,” Nature, vol. 574, no. 7779, pp. 505–510, Oct. 2019, doi: 10.1038/s41586-019-1666-5.

D. Moody et al., “Status report on the second round of the NIST post-quantum cryptography standardization process,” Jul. 2020. doi: 10.6028/nist.ir.8309.

K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical Review Letters, vol. 67, no. 6, pp. 661–663, Aug. 1991, doi: 10.1103/physrevlett.67.661.

N. Sood, “Cryptography in post Quantum computing era,” SSRN Electronic Journal, Jan. 2024, doi: 10.2139/ssrn.4705470.

S. K. Sahu and K. Mazumdar, “State-of-the-art analysis of quantum cryptography: applications and future prospects,” Frontiers in Physics, vol. 12, Aug. 2024, doi: 10.3389/fphy.2024.1456491.

J.-P. Aumasson, “The impact of quantum computing on cryptography,” Computer Fraud & Security, vol. 2017, no. 6, pp. 8–11, Jun. 2017, doi: 10.1016/s1361-3723(17)30051-9.

N. Durr-E-Shahwar, M. Imran, A. B. Altamimi, W. Khan, S. Hussain, and M. Alsaffar, “Quantum Cryptography for Future Networks Security: A Systematic Review,” IEEE Access, vol. 12, pp. 180048–180078, Jan. 2024, doi: 10.1109/access.2024.3504815.

M. Victor, D. D. W. Praveenraj, S. R, A. Alkhayyat, and A. Shakhzoda, “Cryptography: Advances in secure communication and data protection,” E3S Web of Conferences, vol. 399, p. 07010, Jan. 2023, doi: 10.1051/e3sconf/202339907010.

Sibi, “The impact of quantum computing on cryptography,” International Journal for Research in Applied Science and Engineering Technology, vol. 11, no. 3, pp. 1762–1765, Mar. 2023, doi: 10.22214/ijraset.2023.49770.

N. E. O. Sodiya, N. U. J. Umoga, N. O. O. Amoo, and N. A. Atadoga, “Quantum computing and its potential impact on U.S. cybersecurity: A review: Scrutinizing the challenges and opportunities presented by quantum technologies in safeguarding digital assets,” Global Journal of Engineering and Technology Advances, vol. 18, no. 2, pp. 049–064, Feb. 2024, doi: 10.30574/gjeta.2024.18.2.0026.

J. K. Manda, “Quantum-Safe Cryptography for Telecom Networks: Implementing Post-Quantum Cryptography Solutions to Protect Telecom Networks Against Future Quantum Computing Threats ,” SSRN Electronic Journal, Jan. 2025, doi: 10.2139/ssrn.5136797.

M. A. Akbar, A. A. Khan, and S. Hyrynsalmi, “Role of quantum computing in shaping the future of 6 G technology,” Information and Software Technology, vol. 170, p. 107454, Mar. 2024, doi: 10.1016/j.infsof.2024.107454

Downloads

Published

2025-05-05

How to Cite

1.
Nandi S, Vani YS K, Bhat A, G. Poshamallu GP, Shukla S. Quantum Computing and Its Impact on Cryptography the Future of Secure Communication. J Neonatal Surg [Internet]. 2025May5 [cited 2025Sep.19];14(20S):495-502. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/5086

Most read articles by the same author(s)