Research Paper - Quantum Computing and Cybersecurity: “ A double edge sword
Table
of Contents
Executive Summary:
Over the last decade, there have been numerous talks and debates going on
regarding the predictable and potential impact of quantum computing in the
field of cyber security. These debates and arguments regarding quantum
computing and its impact are growing every day. To get insight into these
debates and arguments, this research aims to highlight those impacts analyzing
the advantages and challenges quantum computing carries in current and upcoming
days. Moreover, this research paper will discuss whether quantum computing will
serve the world of cyber security, being a boon or a bane. On the other hand,
this paper will also discuss quantum computing itself to give a general idea of
what quantum computing is and include its fundamental principles,
vulnerabilities, etc. Along with getting to know about quantum computing this
paper will give insights into the cryptography of quantum computing and discuss
the implementation of that cryptography in the future.
Topic and Research Objectives:
The topic of this
research will be discussing the relationship between quantum computing and
cybersecurity. The primary goal of this topic is to know about the implications
of quantum computing in the current context of cybersecurity methods and to
know whether quantum computing will enhance the current power of cybersecurity,
or it will compromise digital security. This research will be conducted to
evaluate the classical computing security protocols with quantum computing
security protocols. Moreover, it will consider the strengths and weaknesses of
quantum computing in the realm of cyber security. This involves how quantum
computing will overcome the classical computing protocols and how it will
increase and decrease the risk of cyber security vulnerabilities that might be coming.
From this understanding, this paper will find out the potential consequences
that the world of cyber security will and can face in the coming future. One of
the most important objectives of this paper is to make everyone aware of the
impacts that quantum computing will bring to the table and how companies and
individuals should be ready to face the challenges and implement the power of
this future technology.
Research Methodology:
This paper will consider different examination of literature that talks about
quantum computing and cyber security. During the process of research, different
articles are going to be considered. The articles that talk about quantum
computing itself along with its fundamental principles will be thoroughly reviewed.
For the in-depth analysis, this paper will involve different scholarly articles
and make them relevant to the article. This paper will consider biases from
different articles and try to improve the arguments presented in the article
with facts and the research itself. The case study will be conducted on whether
the implications of quantum computing in the field of cyber security are better
or bad. This case study will show whether quantum computing will have a
positive influence in the cyber world or will have a negative and dangerous
impact. This paper will also consider the expert opinions from different
surveys and analysis of the statements and publications from recognized experts
in the field of quantum computing and cryptography. The paper will consider and
analyze the framework of NIST (National Institute of Standards and Technology).
All the articles, case studies, and expert opinions will be verified and make
sure they are relevant to the topic. Lastly, these reviews of the studies
conducted will be cited following the APA academic standard to practice the act
of traceability of information back to its origin and support the credibility
of the research.
Qualifications:
As the principal
investigator, I bring to this research a robust background in Computer
information technology and cybersecurity providing a solid academic grounding. This
includes my coursework and projects in the field of cybersecurity. As my academic
background relates to technological knowledge my familiarity with quantum computers
is well enough. Moreover, I have a keen interest in the field of cybersecurity
and enthusiasm for learning new things that will potentially happen in the future
in the field of cybersecurity. My interest in the business implications of
technology is another reason for me to choose this topic. As one of my goals in
the future is to become a cyber security expert this topic needs to be
considered and researched to make myself aware of the coming threats and
vulnerabilities in the future and to know why we need to be prepared to defend these
threats and vulnerabilities. In conclusion, the reason explained above simply clarifies
and equips me to critically study the topic.
Introduction:
In this era of rapid
development of technology, quantum computing has stood out as a revolutionary
invention that will change the shape of modern computing technology. This is a
huge jump in the technology field. Unlike modern classical computing, Quantum
computing is based on the mechanism of Quantum physics. We know that classical
computing operates on binary bits which are 0 and 1 but quantum computing
operates on quantum bits which are also known as qubits. The functionality of
these qubits is way more powerful than the classical computing bits. These
qubits have the power to be found on multiple states at the same time. For
instance, classical computing bits operate in either 0 or 1 at one time
whereas, these qubits can be 0 and 1 at the same time which makes the computer
work faster than ever. To describe it in general terms we can imagine flipping
a coin and the result is both head and tail at the same time. Talking about the
history of quantum computing, the journey of quantum computing traces back to
the early 20th century with the inception of quantum mechanics, and it has
since evolved into a cutting-edge field with the potential to revolutionize
diverse sectors. Even though quantum computing has huge power in the
advancement of the digital and faster world. There has been a debate about the
cyber security threats it comes along with. Many pundits are figuring out
whether quantum computers are good or bad for the coming future. It has been
argued that quantum computing is a promising technology that promises to
revolutionize computational capabilities, while on the other hand, it poses
unprecedented challenges to traditional cryptographic methods. This exploration
delves into the duality of this relationship, navigating the potential benefits
and risks that arise from the integration of quantum computing into the arena of
cybersecurity. The threat that quantum computing possesses cannot be
underestimated. As we are approaching the era of quantum computing the
vulnerabilities it introduces to traditional cryptographic systems necessitate
proactive measures.
Quantum
computing overview:
Quantum
Computing operates on the mechanism of quantum physics. Before knowing about
what threats and solutions that quantum computing brings, we should know about the
different principles that quantum computing operates with.
1. Qubits:
Qubits: Just like classical computing referring 0 and 1 as classical bits.
Quantum computing refers to its bits and qubits. The main difference in
classical bits and qubits is that classical bits exist in one state which is
either 0 or 1 whereas, qubits can exist in both states at the same time which
is 0 and 1 at the same time.
2. Superposition:
Superposition
is one of the properties of quantum mechanics. It states that unlike classical
bits, which can be either 0 or 1, quantum bits (qubits) can exist in a state
that is a linear combination of both 0 and 1 simultaneously. This ability to be
in multiple states at once is what we refer to as superposition.
Quantum
entanglement is a phenomenon where qubits become interconnected, and the state
of one qubit instantaneously influences the state of another, regardless of the
distance between them. This interdependence enhances the coordination and
information transfer within quantum systems.
4. Quantum Gates:
Quantum
gates manipulate qubits through quantum circuits. These gates perform
operations such as entanglement and superposition, forming the basis for
quantum algorithms.
Therefore,
the above are the core principles that quantum computing operates in. Now compare
classical computing and quantum computing. Quantum computing tends to be much
superior. As the processing power of quantum computers can solve the problem
way faster than modern classical computers.
Advantages
for Cybersecurity:
As
we have discussed quantum computing and the principle that it uses. Similarly,
we should know about how quantum computing works. Like classical computing that
operates on classical computing cryptography, quantum computing uses quantum
cryptography to send and receive messages in a network. It is one of the advantages
of cyber security. For instance, “Imagine you have two people, Alice, and Bob,
who want to send a secret to each other that no one else can intercept. With
QKD, Alice sends Bob a series of polarized photons over a fiber optic cable.
This cable doesn’t need to be secured because the photons have a randomized
quantum state. If an eavesdropper, named Eve, tries to listen in on the
conversation, she must read each photon to read the secret. Then she must pass
that photon on to Bob. By reading the photon, Eve alters the photon’s quantum
state, which introduces errors in the quantum key. This alerts Alice and Bob
that someone is listening, and the key has been compromised, so they discard
the key. Alice must send Bob a new key that isn’t compromised, and then Bob can
use that key to read the secret” (Quantumxc, Quantum cryptography, explained
2022). Since the quantum key distribution (QKD) is so secure there is less
chance of any cyber-attack occurrence in the network. The photon state is so
vulnerable that any manipulation can break down its state which will alert both
the receiver and the sender as well as the message disappears in between. This
will protect the network itself, which will enhance the security of the
network.
Another advantage that quantum computing brings to the table is the improvement
of the CIA triad (Confidentiality, integrity, and availability). As mentioned
earlier, quantum computing uses QKD for secured key exchange between sender and
receiver in the network. This feature of quantum computing makes sure that the
key is untouchable into the network because any attempt made to touch the key
will eventually lead the photon state to collapse. This technology mitigates
the risk of any cyber attackers eavesdropping and provides a new level of
confidentiality. Moreover, quantum computing has quantum computing has an
attribute of quantum-hash functions. These hash functions are there to protect
from the quantum computers itself which helps to maintain the integrity of the
digital signatures and other cryptographic operations. Due to their nature of
availability quantum computers possess the power to improve the fault tolerance
which helps the availability part of the CIA triad.
Challenges
and threats:
As
we know, quantum computing will increase the speed of performing complex calculations
way faster than the traditional approach of computing. Switching to quantum computers
might take years because, in the present world scenario, many companies and
organizations or individuals are using trillions of devices that are based on
classical computing cryptography. Devices are using RSA (Rivest–Shamir–Adleman)
and Elliptic curve cryptography (ECC) in the present scenario. Imagine if a
quantum computer gets into the hand of the cybercriminal, From the power of the
quantum computer to do factoring of large numbers in a matter of seconds, an
attacker would probably use Shor’s algorithm to crack the password or the code
which will put the confidentiality of the encrypted information in the network
much faster. To top up with an example our standard password in the present
context is 16 characters, to break these 16 characters' passwords classical
computing takes years whereas, with the power of a quantum computer this
password can be cracked within a matter of seconds.
Another threat that quantum computers possess is the Man in the Middle attack.
If a quantum computer gets into the hands of a hacker, it is possible that the
hacker can manipulate the data in the network without the sender and receiver
knowing about it. To do this hackers will need just seconds because of the
fast-calculating power of quantum computers. Moreover, “The rise of quantum
computing can cause risk to the fledgling blockchain and crypto economy.
Blockchains rely on asymmetric key cryptography algorithms (RSA, EC). These
algorithms can be cracked via quantum computing, resulting in malicious
manipulations of the blockchain. This is one big potential risk that companies
and consumers investing in blockchain technology could face (Panel®, 2022)”.
According
to a Deloitte poll, just over half of its surveyed professionals (50.2%)
believe that their organizations are at risk for "harvest now, decrypt
later" (or HNDL) cybersecurity attacks (Burns, 2023). In the current scenario, it is said that
cybercriminals are in the verge of collecting encrypted data from different organizations.
They are performing this action because once they have the quantum computers in
their hand, they will easily be able to decrypt that and gain control of the
data of the organization, this has become a great organizational threat.
Moreover, another threat quantum computing brings is blockchain technology. A
recent study found that 25% of all bitcoins in circulation and 65% of ether —
the tokens in the Ethereum network — reside in addresses with a public key that
is published on the blockchain. This means they could be stolen by leveraging a
quantum computer with sufficient resources. Hundreds of billions of dollars
worth of cryptocurrencies could be vulnerable to this attack vector (Burns, 2023).
Therefore, to address these challenges different government agencies and
private organizations are working to build cryptography that will address the
threats and challenges that quantum computing brings. Moreover, Security
awareness about the dark side of quantum computers should be provided to
individuals and organizations so that they are prepared to face the impact.
Post-Quantum
Cryptography
Post-quantum
cryptography is a solution to the threat in public key cryptography possessed
by quantum computers. “The goal of post-quantum cryptography (also called
quantum-resistant cryptography) is to develop cryptographic systems that are
secure against both quantum and classical computers and can interoperate with
existing communications protocols and networks” (NIST, Post-quantum cryptography: CSRC 2023).
The National Institute of Standards
and Technology has been continuously working on the standardization of post-quantum
cryptography. In the present context, NIST has requested comments on three
draft Federal Information Processing Standards (FIPS).
One of them is the FIPS 205 stateless Hash-Based Digital signature. This
standard draft released by NIST emphasizes the digital signatures that are used
to verify the identity of the signing and identify any unlawful changes to
data. Furthermore, a digital signature can be used by the recipient of signed
material to prove to a third party that the signature was created by the stated
signatory. Since it is difficult for the signatory to revoke their signature
later, this is known as non-repudiation. A component of the NIST Post-Quantum
Cryptography Standardization process, SPHINCS+ was chosen for standardization
and serves as the foundation for a stateless Hash-Based Digital signature (Moody, 2023).
Another
standard that is being developed is known as the key-encapsulation mechanism
(KEM). A Key Encapsulation Mechanism (KEM) is like a special set of rules that
two people can follow to create a secret key for secure communication, even if
they are talking over a public channel that others can listen to. This secret
key, once established, is like a shared secret code that the two parties can
use to keep their messages private and secure (Moody, 2023). Similarly, there is
another standard that is set for the requirement of digital signature, which is
FIPS 204, Module-lattice-Based Digital Signature Standard. In this standard
digital signature are used to detect if there has been any unwanted
modification to the data that is being transmitted in the network. This
standard working mechanism is to verify the digital signature which will
eventually protect data from the large-scale quantum computer attack.
Future Game:
There is a huge chance of quantum computers being accessible in a few years. At
this point, Quantum computing is in its baby stage. Big companies like IBM and Google
have created a prototype. One of the big challenges as of now is that qubits
require near zero kelvin or -273.15 Celsius to operate (Lee, 2023).
In this scenario, in the future, we will eventually be seeing quantum computers
being in the hands of individuals like we have our laptops and computers as of
today.
Different government agencies and private organizations are working on
defending the possible threats that might come in the upcoming future due to
quantum computing. As discussed earlier, post-quantum cryptography is being
standardized by NIST. Moreover, there has been talk that qubits are increasing
day by day. This growing number of qubits will enhance the power of quantum computers
to handle more complex calculations and surpass the power of the fastest supercomputer
present in the current context. It is said that by 2035-2040 will have 20
million qubits. According to Google “quantum supremacy" paper was about a
53-qubit chip in 2019 (Arute
et al., 2019). This year, they reported having 70 qubits (Morvan et al., 2023).
Therefore, from the above discussion, we can say that in the future quantum
computing will possess more power than we can imagine right now. We need to
make sure that these technologies are not misused. More than that, everyone
should be aware and be prepared to face the advantages and the consequences
coming from quantum computing.
Conclusion:
In summary, this research paper has provided knowledge on quantum computing,
its principles, and history along with the viewpoint about how quantum
computing is going to impact the future generation of cyber security. It has discussed,
compared, and contrasted different articles and case studies, real-world
scenarios, and find out about potential challenges and advantages of quantum
computing in cyber security.
Hence as in the current viewpoint quantum computing is a double-edged sword
there are advantages that it brings and there are disadvantages it brings to
the realm of cyber security. Quantum computers can eliminate cyber security issues
with the power of quantum key cryptography while on the other hand, it might
destroy the current era that is protected by public key cryptography.
Therefore, Government agencies and private organizations that are working in
this field should come up with procedures and policies to eliminate the threats
that can come from quantum computing. Awareness should be given to individuals
and business organizations about these threats so that they can be prepared to
protect themselves from any unwanted access.
References
Quantum computing and
cybersecurity: How to capitalize on opportunities and sidestep risks.
IBM. (n.d.).
https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/quantumsecurity
Quantum cryptography,
explained. QuantumXC. (2022, May 16).
https://quantumxc.com/blog/quantum-cryptography-explained/
Panel®, E. (2022,
November 9). Council post: 13 risks that come with the growing power of
quantum computing. Forbes.
https://www.forbes.com/sites/forbestechcouncil/2022/11/08/13-risks-that-come-with-the-growing-power-of-quantum-computing/?sh=6523a3af54b8
Burns, R. (2023, February
21). Cybersecurity implications of quantum computing. Security Info
Watch.
https://www.securityinfowatch.com/cybersecurity/information-security/managed-network-security/article/53012965/the-cybersecurity-implications-of-quantum-computing
Computer Security
Division, I. T. L. (n.d.). Post-quantum cryptography: CSRC. CSRC.
https://csrc.nist.gov/projects/post-quantum-cryptography
Moody, D. (2023). Stateless
Hash-Based Digital Signature Standard. https://doi.org/10.6028/nist.fips.205.ipd
Lee, J. (2023, March 15).
Quantum Computer Startup SEEQC unveils digital chip that operates at Super
Cold Temp. Reuters.
https://www.reuters.com/technology/quantum-computer-startup-seeqc-unveils-digital-chip-that-operates-super-cold-2023-03-15/#:~:text=One%20challenge%20is%20that%20quantum,operate%20in%20more%20moderate%20temperatures.
Arute, F., Arya, K.,
Babbush, R., Bacon, D., Bardin, J. C., Barends, R., Biswas, R., Boixo, S.,
Brandao, F. G., Buell, D. A., Burkett, B., Chen, Y., Chen, Z., Chiaro, B.,
Collins, R., Courtney, W., Dunsworth, A., Farhi, E., Foxen, B., … Martinis,
J. M. (2019). Quantum supremacy using a programmable superconducting
processor. Nature, 574(7779), 505–510.
https://doi.org/10.1038/s41586-019-1666-5
Morvan, A., Villalonga,
B., Mi, X., Mandrà, S., Bengtsson, A., Klimov, P. V., Chen, Z., Hong, S.,
Erickson, C., Drozdov, I. K., Chau, J., Laun, G., Movassagh, R., Asfaw, A.,
Brandão, L. T. A. N., Peralta, R., Abanin, D., Acharya, R., Allen, R., …
Boixo, S. (2023, April 21). Phase transition in random circuit sampling.
arXiv.org. https://arxiv.org/abs/2304.11119
Comments
Post a Comment