You are on page 1of 3

Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

The Impact of Quantum Computing on Cybersecurity


Abhinandan Joshi
Computer Science & Engineering
National Institute of Technology Uttarakhand, India

Abstract:- In the computer based solutions of the combination in quantum computers is defined as
problems in today’s world; if the problem has a high ”Quantum Bit” or ”Qubit”.
complexity value, different requirements can be  Electrons have a natural spin formation. It is possible that
addressed such as necessity of simultaneous operation of this format can be changed by taking energy from
many computers, the long processing times for the outside. The quantum computers working according to
operatsion of algorithms, and computers with hardware this principle can transform information by changing the
features that can provide high performance. For this spin order of electrons during the processing of
reason, it is inevitable to use a computer based on information.
quantum physics in the near future in order to make  However, another physics principle comes into play in
today’s crypto-systems unsafe, search the servers and such situations: The Heisenberg Uncertainty Principle. It
other information storage centres on internet very proposes that both position and velocity of an electron
quickly, solve optimisation problems in the NP-hard can not be determined at the same time because these
category with a very wide solution space and analyse two states can be transformed into each other. For this
information on large-scale data processing and to process reason, when we examine an electron, it comes out of the
high- resolution image for artificial intelligence state of superposition in which it is found.
applications. In this study, an examination of quantum  The logic of the operation triggered by the presence or
approaches and quantum computers, which will be absence of electrical current in conventional computers
widely used in the near future, was carried out and the occurs at atomic size in quantum computers [a]. Qubits
areas in which such innovation can be used was in quantum computers use the quantum circulant method
evaluated. Malicious or non-malicious use of quantum to interact with each other.
computers with this capacity, the advantages and  The principle of quantum circulation argues that when
disadvantages of the high performance which it provides two electrons interact with each other, if one of the
were examined under the head of security, the effect of electrons is in a spin-down state, the other must be spin-
this recent technology on the existing security systems up.
was investigated.  Understanding how an ordinary process is performed on
quantum computers is the basis for understanding the
Keywords:- Quantum Computer, Security, Cryptography, working mechanism of quantum computers.
Threat.  An electron can pass into the superposition state only if it
is not detected by any observation tools or measuring
I. INTRODUCTION instruments. In other words, the electron must not
interact with any physical environment. If the electron is
Quantum computers; are designed to be based on observed, spin state is fixed to that state. Since the
quantum physics rules and can be expressed as computers observer cannot detect two different states of a material
that have the capacity to process more than the processing simultaneously, the mechanism of the changeable
power and computation capabilities of conventional structure is disturbed.
computers  Observing the result obtained with a quantum computer
actually requires understanding of the operating principle
 Quantum computers, which have a completely different of this device fully. It is enough to obtain a constant
structure from the functioning mechanism of a result from the electrons in the superposition state and to
conventional computer, have the ability to make large- observe these electrons to fix them.
scale calculations conventional computers that can not be  The observing process, performed to obtain the result, is
imagined by. called the collapse of the probability wave function in the
 In conventional computers, the numbers 0 and 1 are quantum physics and all 2-bit qubits are collapsed and
recorded as electrical currents on very small electronic are interpreted as a single value by the observer. All
circuits. If a circuit carries an electrical current it is qubits which are used depending on the first collapsed bit
expressed as 1, when the circuit does not carry an value, will be formed according to the shape of the first
electrical current, it is expressed as 0. qubit and then the results will be obtained.
 In quantum computers, there are 3 different combinations  The idea of using quantum computing on computers was
as working principle [a]. Contrary to conventional first put forward by Richard Feynmann in 1959. But even
computers, quantum computers have more states: 1 state,  the development of the conventional computers used was
0 state, both 1 and 0 state. This format is called the not completed at that time, therefore this idea was not
superposition in the quantum physics, This triple found applicable in real world. The quantum working

IJISRT23MAY261 www.ijisrt.com 286


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
principle use REFERENCES

Social media presence: A strong social media presence [1]. J. A. Silva, T. B. Ludermir, W. R. Oliveira. (2016).
can help your brand reach more people and build Quantum perceptron over a field and neural network
relationships with your target audience. Consider creating architecture selection in a quantum computer, Neural
accounts on platforms like Facebook, Instagram, Twitter, Networks, pp. 55-64.
LinkedIn, and TikTok to promote your brand and engage [2]. M. Gencer, ”Computer Book”, URL:
with potential customers. http://www.mgencer.com/files/Bilgisayartabi.pdf, pp.
21-41.
Search engine optimisation (SEO): Optimising your [3]. G. Arun, V.Mishra. (2014). A review on quantum
website for search engines can help improve your visibility computing and communication, Emerging Technology
in search engine results pages (SERPs). This involves Trends in Electronics, Communication and
researching and incorporating relevant keywords into your Networking, pp. 1-5.
website con- tent, improving your website's loading speed, [4]. I. Sndor, L. Gyongyosi. (2012). Advanced Quantum
and creating high-quality backlinks to your website. Communications: An Engineering Approach. John
Wiley & Sons.
Email marketing: Email marketing is a cost-effective [5]. P. K. Amiri. (2003). ”Quantum computers”, IEEE
way to reach your target audience and promote your brand. Potentials, vol. 21 (5), pp.6-9.
Collect email addresses from your website visitors and use [6]. S. Shamsolah Salemian, S. Mohammadnejad. (2010).
email marketing software to create and send personalised ”An Error-Free Protocol for Quantum Entanglement
emails to your subscribers. Distribution in Long Distance Quantum
Communication”, Communication Systems Networks
Content marketing: Content marketing involves and Digital Signal Processing (CSNDSP), pp. 626-630.
creating and sharing valuable content that informs, educates, [7]. C. P. Williams, S. H. Clearwater. (1998) ”Explorations
or entertains your target audience. This can include blog in Quantum Computing”, Springer-Verlag NewYork,
posts, videos, infographics, podcasts, and more. By Inc. TELOS.
consistently providing valuable content, you can build trust [8]. P. W. Shor. (1994). ”Algorithms for quantum
with your audience and establish your brand as an authority computation: discrete logarithms and factoring”,
in your industry. Proceedings of the 35th Symposium on Foundations of
Computer Science, Los Alamitos, IEEE Computer
Influencer marketing: Collaborating with social media Society Press, pp. 124-134.
influencers can help your brand reach a wider audience and [9]. N. Wiebe, A. Kapoor, K.M. Svore. (2014). ”Quantum
build credibility with your target market. Look for deep learning”. Retrieved from URL:
influencers who align with your brand values and have a https://arxiv.org/abs/1412.3489
strong following in your industry [10]. S. J. Devitt. (2016). ”Performing quantum computing
experiments in the cloud”. Retrieved from URL:
Events and sponsorships: Participating in relevant https://journals.aps.org/pra/abstract/10.1103/PhysRevA
events and sponsoring industry related organisations or .94.032329
causes can help your brand gain exposure and build [11]. K. P. Kumar. (2013). ”PQ key-a novel key generation
relationships with your target audience. Consider attending algorithm for processing big data using quantum
trade shows, hosting webinars, or sponsoring community computing”. Retrieved from URL: http://digital-
events to promote your brand. library.theiet.org/content/conferences/10.1049/cp.2013.
Referral programs: Encouraging your satisfied 2481
customers to refer others to your brand can be a powerful [12]. F. S. Grodzinsky, M. J. Wolf, K. W. Miller. (2011).
way to grow your customer base. Offer incentives like ”Quantum computing and cloud computing: humans
discounts or free products/services to customers who refer trusting humans via machines”, Technology and
others to your business. Society (ISTAS), pp. 1-5.
[13]. H. Singh, A.Sachdev. (2014). ”The quantum way of
In conclusion, there are many ways to promote your cloud computing”, Optimisation, Reliability, and
brand and attract new customers. By implementing a Information Technology (ICROIT) 2014 International
combination of the strategies above and continuously Conference, pp. 397-400.
monitoring and adjusting your marketing efforts, you can [14]. S. Caraiman,V.Manta. (2012). ”Image processing using
effectively reach your target audience and grow your quantum computing”, System Theory, Control and
business. Computing (ICSTCC), 2012 16th International
Conference, pp. 1-6.
[15]. V. Hahanov, V. Miz. (2013).” Quantum computing
approach for shortest route finding”, East-West Design
& Test Symposium, pp. 1-4.

IJISRT23MAY261 www.ijisrt.com 287


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
[16]. O. Korchenko, Y. Vasiliu, S. Gnatyuk. (2010).
”Modern quantum technologies of information
security”.
[17]. Shor, P. W. (1994). Algorithms for quantum
computation: Discrete logarithms and factoring.
Proceedings 35th Annual Symposium on Foundations
of Computer Science.
[18]. M. N. Abdullah, M. T. Islam, M. M. Kabir, & M. R.
Amin. (2018). Quantum computing: An overview with
challenges and future prospects. International Journal
of Computer Science and Network Security, 18(6), 94-
101.
[19]. A. E. Rakhmanov, S. S. Knyazeva, D. A. Sidorov, &
V. P. Shkodyrev. (2019). The future of quantum
cryptography in the context of quantum computing.
Journal of Physics: Conference Series, 1270(1),
012102.
[20]. A. R. Calderbank, P. W. Shor, & J. A. Smolin. (1998).
Quantum error correction via codes over GF(4). IEEE
Transactions on Information Theory, 44(4), 1369-1387.
[21]. S. Haroche & J-M. Raimond. (2006). Exploring the
Quantum: Atoms, Cavities, and Photons. Oxford
University Press.
[22]. A. O. Pittenger. (2000). An introduction to quantum
computation algorithms. Progress of Theoretical
Physics Supplement, 139, 77-108.
[23]. A. E. Siegman. (1986). Lasers. University Science
Books.
[24]. R. P. Feynman. (1982). Simulating physics with
computers. International Journal of Theoretical
Physics, 21(6/7), 467-488.
[25]. C. Monroe & J. Kim. (2013). Scaling the ion trap
quantum processor. Science, 339(6124), 1164-1169.
[26]. D. C. McKay, S. Sheldon, J. A. Smolin, & J. M. Chow.
(2019). Efficient Z-measurement calibration for
quantum devices with correlated noise. Physical
Review A, 100(2), 022341.
[27]. Y. Su, W. Li, M. Li, & X. Li. (2019). Image
recognition with quantum-enhanced feature extraction.
IEEE Access, 7, 13846-
[28]. A. G. Fowler, M. Mariantoni, J. M. Martinis, & A. N.
Cleland. (2012). Surface codes: Towards practical
large-scale quantum computation. Physical Review A,
86(3), 032324.
[29]. D. V. Averin & C. Bruder. (2003). Capacitive coupling
of charge qubits. Physical Review B, 67(16), 165322.
[30]. M. A. Nielsen. (2010). Quantum computation with
cluster states. Quantum Information and Computation,
10(1&2), 5-48.

IJISRT23MAY261 www.ijisrt.com 288

You might also like