Analyzing Quantum Computing's Effect on Modern Cryptography Methods

Verified

Added on  2023/06/03

|12
|2180
|453
Report
AI Summary
This report delves into the intersection of quantum computing and modern cryptographic techniques. It begins by highlighting the increasing importance of data integrity, confidentiality, authenticity, and non-repudiation in the digital age, setting the stage for an analysis of how quantum computing is reshaping the field. The report explores the limitations of current cryptographic methods, such as RSA and asymmetric cryptography, which are facing challenges due to complex calculations and slower processing times. It then outlines the aim, objectives, and research questions, which focus on analyzing the impact of quantum computing on modern cryptographic techniques. The literature review examines the existing literature on quantum computing and cryptography, discussing the differences between symmetric and asymmetric cryptography. The report also explores the benefits of quantum computing, such as enhanced key confidentiality and authentication, and discusses a proposed algorithm. The methodology section describes the qualitative approach used for data collection and analysis, including the use of secondary data from online journals, articles, and books. The report concludes by summarizing the key findings and implications of the research, emphasizing how quantum computing can help minimize issues related to modern cryptography and resolve problems in the RSA algorithm and factorization. The report also includes a timeline and budget for the study and references for further reading.
Document Page
Running head: Quantum Computing and Cryptography
Quantum Computing and Cryptography
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
Quantum Computing and Cryptography
Abstract
This research has been based on quantum computing and cryptography techniques. The aim of
research is to analyze impact of Quantum computing on modern cryptographic techniques. The
literature review has been focused on the existing literatures on the quantum cryptography
techniques. The factorization problem in the RSA Cryptography has been one of the major
problems in the modern schemes. The research has selected quantitative approach and secondary
method of data collection. Data has been collected from online journals, books and articles.
Document Page
3
Quantum Computing and Cryptography
Table of Contents
Introduction......................................................................................................................................4
Background..................................................................................................................................4
Problem Statement.......................................................................................................................4
Research Aim, Objective and Questions.....................................................................................4
Literature Review............................................................................................................................5
Impact of Quantum computing in modern cryptographic techniques.........................................6
Methodology....................................................................................................................................8
Timeline.......................................................................................................................................9
Conclusion.....................................................................................................................................10
Document Page
4
Quantum Computing and Cryptography
Introduction
Background
The advancement in the modern technology has been enriching electronic communication
in the modern age. There have been requirement of integrity, confidentiality, authenticity and
non-repudiation in data transfer and storage in concept of cryptography (Chen et al., 2016).
Quantum Computing has been derived for expending modern cryptography techniques in the
market. Symmetric cryptography has been affected by the modern methods of cryptographic
techniques used in algorithms. Quantum cryptography has been one of the emerging technology
in the IT field (Chen et al., 2015). This paper will discuss about the impact of the Quantum
computing in present cryptographic techniques. This paper will also focus on the problems faced
in modern cryptographic techniques.
Problem Statement
Modern cryptography techniques have been facing problems as pubic key cryptography
has been including complex calculations and slow in processing. Therefore, exchange of keys
during data transfer has been at minimum pace. Encryption of high volume data has not been
possible and being complex process (Hu et al., 2018). The factorization problem in the RSA
Cryptography has been one of the major problems in the modern schemes. RSA has been mainly
used for exchange of keys during data transfer that has been slow. The discrete logarithm
problem has been evolving in the asymmetric cryptography. Quantum algorithms have been
probalistic that have been causing problems in operating various algorithms in the cryptography.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
Quantum Computing and Cryptography
Research Aim, Objective and Questions
The aim of the paper is to analyze impact of Quantum computing on the modern
cryptographic techniques.
Following are objectives of the research:
To analyze the impact of quantum computing on modern cryptographic techniques
To identify issues in the modern cryptographic techniques
To recommend solution to these issues in the modern cryptographic techniques using
quantum computing
Following are the research questions:
What is the impact of quantum computing on modern cryptographic techniques?
What are issues faced in the modern cryptographic techniques?
How these issues in the modern cryptographic techniques using quantum computing be
resolved?
Literature Review
The literature review has been focused on the existing literature on quantum computing
and cryptography techniques. The present cryptography techniques have been divided into two
parts including symmetric and asymmetric cryptography. Symmetric cryptography deals with
sender and receiver having same secret key and same algorithm for cryptographic encryption and
decryption (Bennett & Brassard, 2014).
Asymmetric cryptography deals with the system in which keys come in pair. Each party
have been using own private and public keys. Asymmetric cryptography deals with the digital
Document Page
6
Quantum Computing and Cryptography
signatures. For example, Alice can sign a document digitally with her private key and Bob can
verify the signature with Alice’s known public key.
Quantum cryptography has been based on basic principles of quantum mechanics.
Quantum cryptography has been depended on Heisenberg Uncertainty Principle and principle of
photon polarization. However, as per Heisenberg Uncertainty Principle, it is not possible for
measuring quantum state without disturbing system (Hassanien, Elhoseny & Kacprzyk, 2018).
Therefore, polarization of photon particle has been measured at that point during measuring.
These photons have been polarized at different orientations and it represent bits encompassing
ones and zeroes (Peikert, 2016). Therefore, strength of the modern digital cryptography has been
depended on functional difficulty for factoring large numbers. Quantum cryptography has been
has been completely based on rules of physics and independent on power of current computing
systems.
Figure 1: Quantum Key Distribution Example
(Source:
Document Page
7
Quantum Computing and Cryptography
Impact of Quantum computing in modern cryptographic techniques
There have been various impact of quantum computing in modern cryptographic
techniques. Some of the benefits have been stated below;
Confidentiality of keys: Confidentiality has been one of the important part in the
cryptographic process (Buchmann, Lauter & Mosca, 2017). Quantum cryptography techniques
have been properly embedded in secure system that can be available for providing automatic
distribution of keys enhancing security level in encryption and decryption process.
Authentication: Authentication problems have been prevailing in modern cryptographic
techniques. Therefore, anyone ca decrypt the data received from sender end. This have been
creating problems for user to ensure the security of data and information even after encryption.
Quantum cryptography has been creating system for automatic change in the distribution of keys
during process (Han et al., 2016). This have been helping in providing authentic environment to
the cryptographic techniques. A proposed algorithm has been provided below:
The algorithm does the following:
• n = 15, is the number we want to factorize
• x = random number such as 1 < x < n − 1
• x is raised to the power contained in the register (every
possible state) and then divided by n
The remainder from this operation is stored in a second 4-qubit register. The second register now
contains the superposition results. Let’s assume that x = 2 which is larger than 1 and smaller than
14.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
Quantum Computing and Cryptography
• If we raise x to the powers of the 4-qubit register which is a maximum of 15 and divide by 15,
the remainders are shown in Table II. What we observe in the results is a repeating sequence of 4
numbers (1,2,4,8). We can confidently say then that f = 4 which is the sequence when x = 2 and
n=15. The value f can be used to calculate a possible factor with the following equation:
Possible factor: P = xf/2 – 1
In case we get a result which is not a prime number we repeat the calculation with different f
values.
Methodology
The methodology section deals with the methods and approaches followed in the research
in order to complete it with proper outcomes. The research will follow a qualitative approach to
proceed in the study. Data collection has been an important part of the research (Silverman,
2016). Two types of data collection techniques are primary and secondary data collection method
(Mavroeidis et al., 2018). Primary data collection method deals with raw data collected from
conducting online survey with various participants. Secondary data collection methods have been
depending on the secondary sources including online journals, books, articles and governmental
databases (Mackey & Gass, 2015). This has been helping in gathering a huge amount of data and
information in a less amount of time in less complexity. This research has been using secondary
method of data collection. Therefore, all data and information regarding quantum computing and
cryptography has been taken form online journals, articles and books related to the topic. The
sample size has been 12 online journals published after 2012 related to quantum computing and
cryptography. Data has been analysed using qualitative data analysis method. Thematic analysis
has been done on secondary data collected from various online journals and articles (Lewis,
Document Page
9
Quantum Computing and Cryptography
2015). The research has been following all ethics and values included in the research. Data and
information collected from secondary sources has been kept secure and safe. Data and
information have been kept safe under the Data Protection Act 1998. There have been some
limitations faced during data collection method. Various journals does not have author name and
were not published after 2012 (Vaioleti, 2016). Various journals have been published in different
language that cannot be taken for data collection. Some of the journals have been of paid version
and cannot be accessed for data collection.
Timeline
Activities Duration
wk 1 wk2 wk3 wk4 wk 5 w k6 wk 7 wk 8
Topic
selection for
the study
Preparing
the layout for
proposal
Design the
research
proposal
Literature
Review
Developing
the proper
methodology
for research
Collection of
the Secondary
Data
Analysis of
the Data
Collection of
findings from
the analysis
Drawing
conclusions
from the study
Preparation
Document Page
10
Quantum Computing and Cryptography
of rough draft
for the study
Review and
final
submission of
the work
$0
$500
$1,000
$1,500
$2,000
$2,500
Budget
Conclusion
It can be concluded that use of the quantum computing have been helping in minimizing
issues related to modern cryptography. The use of quantum cryptography has helped in resolving
issues in the modern cryptography. Issues related to RSA algorithm and factorization will be
solved by the use of quantum cryptography. Public keys have been suffering with ongoing
uncertainty during decryption mathematically.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
Quantum Computing and Cryptography
References
Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key distribution and coin
tossing. Theor. Comput. Sci., 560(P1), 7-11.
Buchmann, J., Lauter, K., & Mosca, M. (2017). Postquantum Cryptography—State of the
Art. IEEE Security & Privacy, 15(4), 12-13.
Chen, C. Y., Zeng, G. J., Lin, F. J., Chou, Y. H., & Chao, H. C. (2015). Quantum cryptography
and its applications over the internet. IEEE Network, 29(5), 64-69.
Chen, L., Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., ... & Smith-Tone, D.
(2016). Report on post-quantum cryptography. US Department of Commerce, National
Institute of Standards and Technology.
Han, J., Liu, Y., Sun, X., & Song, L. (2016, August). Enhancing data and privacy security in
mobile cloud computing through quantum cryptography. In Software Engineering and
Service Science (ICSESS), 2016 7th IEEE International Conference on (pp. 398-401).
Ieee.
Hassanien, A. E., Elhoseny, M., & Kacprzyk, J. (Eds.). (2018). Quantum Computing: An
Environment for Intelligent Large Scale Real Application. Springer International
Publishing.
Hu, F., Lamata, L., Sanz, M., Chen, X., Chen, X., Wang, C., & Solano, E. (2018). Quantum
computing cryptography: Unveiling cryptographic Boolean functions with quantum
annealing. arXiv preprint arXiv:1806.08706.
Document Page
12
Quantum Computing and Cryptography
Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five
approaches. Health promotion practice, 16(4), 473-475.
Mackey, A., & Gass, S. M. (2015). Second language research: Methodology and design.
Routledge.
Mavroeidis, V., Vishi, K., Zych, M. D., & Jøsang, A. (2018). The Impact of Quantum
Computing on Present Cryptography. arXiv preprint arXiv:1804.00200.
Peikert, C. (2016). A decade of lattice cryptography. Foundations and Trends® in Theoretical
Computer Science, 10(4), 283-424.
Silverman, D. (Ed.). (2016). Qualitative research. Sage.
Vaioleti, T. M. (2016). Talanoa research methodology: A developing position on Pacific
research. Waikato Journal of Education, 12(1).
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]