Affiliation:
1. Amity Institute of Information Technology, Amity University Noida, India
Abstract
With the approach of quantum processing, customary cryptographic calculations and conventions utilized for PC security face critical difficulties. This examination paper investigates the utilization of quantum registering in PC security and its possible effect on the field. The authors give an outline of quantum registering, featuring its remarkable properties and computational benefits. Consequently, they talk about the weaknesses of traditional cryptographic frameworks to quantum assaults and the requirement for post-quantum cryptography. Moreover, they dive into explicit utilizations of quantum figuring in PC security, including quantum key dispersion, quantum-safe calculations, and secure multiparty calculation. At last, they look at the present status of examination, difficulties, and future headings in utilizing quantum processing for improving PC security.
Reference30 articles.
1. Abomhara M. & Kien, G. M. (2015). Vulnerabilities, dangers, intrusions, and assaults related to cyber security and the internet of things. J. Cyber Secur. Mobil.
2. Artur, K. (1991). Ekert, Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661. https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.67.661
3. Arya, K., Arute, F., & Babbush, R. (2019). Employing a programmable superconducting processor to achieve quantum dominance. Nature.
4. A Quantum Secure Direct Communication Protocol.;K.Azouit;2021 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS),2021
5. Boskovic, M., Becker, S., & Dhama, A. (2006). Trustworthy Software Systems: Definition and Discussion of Basic Terms. ACM SIGSOFT Softw. Eng. Notes,31(1).