Research Paper - Quantum Computing and Cybersecurity: “ A double edge sword
Table of Contents Executive Summary: 2 Research Methodology: 3 Qualifications: 4 Introduction: 4 Quantum computing overview: 5 1. Qubits: 5 2. Superposition: 6 3. Entanglement: 6 4. Quantum Gates: 6 Advantages for Cybersecurity: 7 Challenges and threats: 9 Post-Quantum Cryptography . 10 Future Game: 12 Conclusion: 13 References . 14 Executive Summary: Over the last decade, there have been numerous talks and debates going on regarding the predictable and potential impact of quantum computing in the field of cyber security. These debates and arguments regarding quantum computing and its impact are growing every day. To get insight into these debates and arguments, this research aims to highlight those impacts analyzing the advantages and challenges quantum computing carries in current and upcoming days. Moreover, this research paper will discuss whether quantum computing will serve the world of cyber security, being a boo...