Research Paper - Quantum Computing and Cybersecurity: “ A double edge sword

 



Table of Contents

Executive Summary: 2

Research Methodology: 3

Qualifications: 4

Introduction: 4

Quantum computing overview: 5

1. Qubits: 5

2. Superposition: 6

3. Entanglement: 6

4. Quantum Gates: 6

Advantages for Cybersecurity: 7

Challenges and threats: 9

Post-Quantum Cryptography. 10

Future Game: 12

Conclusion: 13

References. 14

 

Executive Summary:
Over the last decade, there have been numerous talks and debates going on regarding the predictable and potential impact of quantum computing in the field of cyber security. These debates and arguments regarding quantum computing and its impact are growing every day. To get insight into these debates and arguments, this research aims to highlight those impacts analyzing the advantages and challenges quantum computing carries in current and upcoming days. Moreover, this research paper will discuss whether quantum computing will serve the world of cyber security, being a boon or a bane. On the other hand, this paper will also discuss quantum computing itself to give a general idea of what quantum computing is and include its fundamental principles, vulnerabilities, etc. Along with getting to know about quantum computing this paper will give insights into the cryptography of quantum computing and discuss the implementation of that cryptography in the future.

Topic and Research Objectives:

The topic of this research will be discussing the relationship between quantum computing and cybersecurity. The primary goal of this topic is to know about the implications of quantum computing in the current context of cybersecurity methods and to know whether quantum computing will enhance the current power of cybersecurity, or it will compromise digital security. This research will be conducted to evaluate the classical computing security protocols with quantum computing security protocols. Moreover, it will consider the strengths and weaknesses of quantum computing in the realm of cyber security. This involves how quantum computing will overcome the classical computing protocols and how it will increase and decrease the risk of cyber security vulnerabilities that might be coming. From this understanding, this paper will find out the potential consequences that the world of cyber security will and can face in the coming future. One of the most important objectives of this paper is to make everyone aware of the impacts that quantum computing will bring to the table and how companies and individuals should be ready to face the challenges and implement the power of this future technology.


Research Methodology:
This paper will consider different examination of literature that talks about quantum computing and cyber security. During the process of research, different articles are going to be considered. The articles that talk about quantum computing itself along with its fundamental principles will be thoroughly reviewed. For the in-depth analysis, this paper will involve different scholarly articles and make them relevant to the article. This paper will consider biases from different articles and try to improve the arguments presented in the article with facts and the research itself. The case study will be conducted on whether the implications of quantum computing in the field of cyber security are better or bad. This case study will show whether quantum computing will have a positive influence in the cyber world or will have a negative and dangerous impact. This paper will also consider the expert opinions from different surveys and analysis of the statements and publications from recognized experts in the field of quantum computing and cryptography. The paper will consider and analyze the framework of NIST (National Institute of Standards and Technology). All the articles, case studies, and expert opinions will be verified and make sure they are relevant to the topic. Lastly, these reviews of the studies conducted will be cited following the APA academic standard to practice the act of traceability of information back to its origin and support the credibility of the research.

Qualifications:

As the principal investigator, I bring to this research a robust background in Computer information technology and cybersecurity providing a solid academic grounding. This includes my coursework and projects in the field of cybersecurity. As my academic background relates to technological knowledge my familiarity with quantum computers is well enough. Moreover, I have a keen interest in the field of cybersecurity and enthusiasm for learning new things that will potentially happen in the future in the field of cybersecurity. My interest in the business implications of technology is another reason for me to choose this topic. As one of my goals in the future is to become a cyber security expert this topic needs to be considered and researched to make myself aware of the coming threats and vulnerabilities in the future and to know why we need to be prepared to defend these threats and vulnerabilities. In conclusion, the reason explained above simply clarifies and equips me to critically study the topic.

 

 

Introduction:

In this era of rapid development of technology, quantum computing has stood out as a revolutionary invention that will change the shape of modern computing technology. This is a huge jump in the technology field. Unlike modern classical computing, Quantum computing is based on the mechanism of Quantum physics. We know that classical computing operates on binary bits which are 0 and 1 but quantum computing operates on quantum bits which are also known as qubits. The functionality of these qubits is way more powerful than the classical computing bits. These qubits have the power to be found on multiple states at the same time. For instance, classical computing bits operate in either 0 or 1 at one time whereas, these qubits can be 0 and 1 at the same time which makes the computer work faster than ever. To describe it in general terms we can imagine flipping a coin and the result is both head and tail at the same time. Talking about the history of quantum computing, the journey of quantum computing traces back to the early 20th century with the inception of quantum mechanics, and it has since evolved into a cutting-edge field with the potential to revolutionize diverse sectors. Even though quantum computing has huge power in the advancement of the digital and faster world. There has been a debate about the cyber security threats it comes along with. Many pundits are figuring out whether quantum computers are good or bad for the coming future. It has been argued that quantum computing is a promising technology that promises to revolutionize computational capabilities, while on the other hand, it poses unprecedented challenges to traditional cryptographic methods. This exploration delves into the duality of this relationship, navigating the potential benefits and risks that arise from the integration of quantum computing into the arena of cybersecurity. The threat that quantum computing possesses cannot be underestimated. As we are approaching the era of quantum computing the vulnerabilities it introduces to traditional cryptographic systems necessitate proactive measures.

Quantum computing overview:

 

Quantum Computing operates on the mechanism of quantum physics. Before knowing about what threats and solutions that quantum computing brings, we should know about the different principles that quantum computing operates with.

1. Qubits:
Qubits: Just like classical computing referring 0 and 1 as classical bits. Quantum computing refers to its bits and qubits. The main difference in classical bits and qubits is that classical bits exist in one state which is either 0 or 1 whereas, qubits can exist in both states at the same time which is 0 and 1 at the same time.

2. Superposition:

 

Superposition is one of the properties of quantum mechanics. It states that unlike classical bits, which can be either 0 or 1, quantum bits (qubits) can exist in a state that is a linear combination of both 0 and 1 simultaneously. This ability to be in multiple states at once is what we refer to as superposition.

3. Entanglement:

Quantum entanglement is a phenomenon where qubits become interconnected, and the state of one qubit instantaneously influences the state of another, regardless of the distance between them. This interdependence enhances the coordination and information transfer within quantum systems.

4. Quantum Gates:

 

Quantum gates manipulate qubits through quantum circuits. These gates perform operations such as entanglement and superposition, forming the basis for quantum algorithms.

Therefore, the above are the core principles that quantum computing operates in. Now compare classical computing and quantum computing. Quantum computing tends to be much superior. As the processing power of quantum computers can solve the problem way faster than modern classical computers.

 

Advantages for Cybersecurity:

 

As we have discussed quantum computing and the principle that it uses. Similarly, we should know about how quantum computing works. Like classical computing that operates on classical computing cryptography, quantum computing uses quantum cryptography to send and receive messages in a network. It is one of the advantages of cyber security. For instance, “Imagine you have two people, Alice, and Bob, who want to send a secret to each other that no one else can intercept. With QKD, Alice sends Bob a series of polarized photons over a fiber optic cable. This cable doesn’t need to be secured because the photons have a randomized quantum state. If an eavesdropper, named Eve, tries to listen in on the conversation, she must read each photon to read the secret. Then she must pass that photon on to Bob. By reading the photon, Eve alters the photon’s quantum state, which introduces errors in the quantum key. This alerts Alice and Bob that someone is listening, and the key has been compromised, so they discard the key. Alice must send Bob a new key that isn’t compromised, and then Bob can use that key to read the secret” (Quantumxc, Quantum cryptography, explained 2022). Since the quantum key distribution (QKD) is so secure there is less chance of any cyber-attack occurrence in the network. The photon state is so vulnerable that any manipulation can break down its state which will alert both the receiver and the sender as well as the message disappears in between. This will protect the network itself, which will enhance the security of the network.
Another advantage that quantum computing brings to the table is the improvement of the CIA triad (Confidentiality, integrity, and availability). As mentioned earlier, quantum computing uses QKD for secured key exchange between sender and receiver in the network. This feature of quantum computing makes sure that the key is untouchable into the network because any attempt made to touch the key will eventually lead the photon state to collapse. This technology mitigates the risk of any cyber attackers eavesdropping and provides a new level of confidentiality. Moreover, quantum computing has quantum computing has an attribute of quantum-hash functions. These hash functions are there to protect from the quantum computers itself which helps to maintain the integrity of the digital signatures and other cryptographic operations. Due to their nature of availability quantum computers possess the power to improve the fault tolerance which helps the availability part of the CIA triad.

 

Challenges and threats:

 

As we know, quantum computing will increase the speed of performing complex calculations way faster than the traditional approach of computing. Switching to quantum computers might take years because, in the present world scenario, many companies and organizations or individuals are using trillions of devices that are based on classical computing cryptography. Devices are using RSA (Rivest–Shamir–Adleman) and Elliptic curve cryptography (ECC) in the present scenario. Imagine if a quantum computer gets into the hand of the cybercriminal, From the power of the quantum computer to do factoring of large numbers in a matter of seconds, an attacker would probably use Shor’s algorithm to crack the password or the code which will put the confidentiality of the encrypted information in the network much faster. To top up with an example our standard password in the present context is 16 characters, to break these 16 characters' passwords classical computing takes years whereas, with the power of a quantum computer this password can be cracked within a matter of seconds.
Another threat that quantum computers possess is the Man in the Middle attack. If a quantum computer gets into the hands of a hacker, it is possible that the hacker can manipulate the data in the network without the sender and receiver knowing about it. To do this hackers will need just seconds because of the fast-calculating power of quantum computers. Moreover, “The rise of quantum computing can cause risk to the fledgling blockchain and crypto economy. Blockchains rely on asymmetric key cryptography algorithms (RSA, EC). These algorithms can be cracked via quantum computing, resulting in malicious manipulations of the blockchain. This is one big potential risk that companies and consumers investing in blockchain technology could face
(Panel®, 2022)”.

According to a Deloitte poll, just over half of its surveyed professionals (50.2%) believe that their organizations are at risk for "harvest now, decrypt later" (or HNDL) cybersecurity attacks (Burns, 2023).  In the current scenario, it is said that cybercriminals are in the verge of collecting encrypted data from different organizations. They are performing this action because once they have the quantum computers in their hand, they will easily be able to decrypt that and gain control of the data of the organization, this has become a great organizational threat. Moreover, another threat quantum computing brings is blockchain technology. A recent study found that 25% of all bitcoins in circulation and 65% of ether — the tokens in the Ethereum network — reside in addresses with a public key that is published on the blockchain. This means they could be stolen by leveraging a quantum computer with sufficient resources. Hundreds of billions of dollars worth of cryptocurrencies could be vulnerable to this attack vector (Burns, 2023).
Therefore, to address these challenges different government agencies and private organizations are working to build cryptography that will address the threats and challenges that quantum computing brings. Moreover, Security awareness about the dark side of quantum computers should be provided to individuals and organizations so that they are prepared to face the impact.

 

Post-Quantum Cryptography

 

Post-quantum cryptography is a solution to the threat in public key cryptography possessed by quantum computers. “The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks” (NIST, Post-quantum cryptography: CSRC 2023).

IoT | Free Full-Text | Post-Quantum Cryptosystems for Internet-of-Things: A  Survey on Lattice-Based AlgorithmsThe National Institute of Standards and Technology has been continuously working on the standardization of post-quantum cryptography. In the present context, NIST has requested comments on three draft Federal Information Processing Standards (FIPS).
One of them is the FIPS 205 stateless Hash-Based Digital signature. This standard draft released by NIST emphasizes the digital signatures that are used to verify the identity of the signing and identify any unlawful changes to data. Furthermore, a digital signature can be used by the recipient of signed material to prove to a third party that the signature was created by the stated signatory. Since it is difficult for the signatory to revoke their signature later, this is known as non-repudiation. A component of the NIST Post-Quantum Cryptography Standardization process, SPHINCS+ was chosen for standardization and serves as the foundation for a stateless Hash-Based Digital signature
(Moody, 2023).

Another standard that is being developed is known as the key-encapsulation mechanism (KEM). A Key Encapsulation Mechanism (KEM) is like a special set of rules that two people can follow to create a secret key for secure communication, even if they are talking over a public channel that others can listen to. This secret key, once established, is like a shared secret code that the two parties can use to keep their messages private and secure (Moody, 2023). Similarly, there is another standard that is set for the requirement of digital signature, which is FIPS 204, Module-lattice-Based Digital Signature Standard. In this standard digital signature are used to detect if there has been any unwanted modification to the data that is being transmitted in the network. This standard working mechanism is to verify the digital signature which will eventually protect data from the large-scale quantum computer attack.

 

Future Game:
There is a huge chance of quantum computers being accessible in a few years. At this point, Quantum computing is in its baby stage. Big companies like IBM and Google have created a prototype. One of the big challenges as of now is that qubits require near zero kelvin or -273.15 Celsius to operate
(Lee, 2023). In this scenario, in the future, we will eventually be seeing quantum computers being in the hands of individuals like we have our laptops and computers as of today.
Different government agencies and private organizations are working on defending the possible threats that might come in the upcoming future due to quantum computing. As discussed earlier, post-quantum cryptography is being standardized by NIST. Moreover, there has been talk that qubits are increasing day by day. This growing number of qubits will enhance the power of quantum computers to handle more complex calculations and surpass the power of the fastest supercomputer present in the current context. It is said that by 2035-2040 will have 20 million qubits. According to Google “quantum supremacy" paper was about a 53-qubit chip in 2019
(Arute et al., 2019). This year, they reported having 70 qubits (Morvan et al., 2023).
Therefore, from the above discussion, we can say that in the future quantum computing will possess more power than we can imagine right now. We need to make sure that these technologies are not misused. More than that, everyone should be aware and be prepared to face the advantages and the consequences coming from quantum computing.

Conclusion:
In summary, this research paper has provided knowledge on quantum computing, its principles, and history along with the viewpoint about how quantum computing is going to impact the future generation of cyber security. It has discussed, compared, and contrasted different articles and case studies, real-world scenarios, and find out about potential challenges and advantages of quantum computing in cyber security.
Hence as in the current viewpoint quantum computing is a double-edged sword there are advantages that it brings and there are disadvantages it brings to the realm of cyber security. Quantum computers can eliminate cyber security issues with the power of quantum key cryptography while on the other hand, it might destroy the current era that is protected by public key cryptography. Therefore, Government agencies and private organizations that are working in this field should come up with procedures and policies to eliminate the threats that can come from quantum computing. Awareness should be given to individuals and business organizations about these threats so that they can be prepared to protect themselves from any unwanted access.

 

References

 

Quantum computing and cybersecurity: How to capitalize on opportunities and sidestep risks. IBM. (n.d.). https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/quantumsecurity

Quantum cryptography, explained. QuantumXC. (2022, May 16). https://quantumxc.com/blog/quantum-cryptography-explained/

Panel®, E. (2022, November 9). Council post: 13 risks that come with the growing power of quantum computing. Forbes. https://www.forbes.com/sites/forbestechcouncil/2022/11/08/13-risks-that-come-with-the-growing-power-of-quantum-computing/?sh=6523a3af54b8

Burns, R. (2023, February 21). Cybersecurity implications of quantum computing. Security Info Watch. https://www.securityinfowatch.com/cybersecurity/information-security/managed-network-security/article/53012965/the-cybersecurity-implications-of-quantum-computing

Computer Security Division, I. T. L. (n.d.). Post-quantum cryptography: CSRC. CSRC. https://csrc.nist.gov/projects/post-quantum-cryptography

Moody, D. (2023). Stateless Hash-Based Digital Signature Standard. https://doi.org/10.6028/nist.fips.205.ipd

Lee, J. (2023, March 15). Quantum Computer Startup SEEQC unveils digital chip that operates at Super Cold Temp. Reuters. https://www.reuters.com/technology/quantum-computer-startup-seeqc-unveils-digital-chip-that-operates-super-cold-2023-03-15/#:~:text=One%20challenge%20is%20that%20quantum,operate%20in%20more%20moderate%20temperatures.

Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., Biswas, R., Boixo, S., Brandao, F. G., Buell, D. A., Burkett, B., Chen, Y., Chen, Z., Chiaro, B., Collins, R., Courtney, W., Dunsworth, A., Farhi, E., Foxen, B., … Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574(7779), 505–510. https://doi.org/10.1038/s41586-019-1666-5

Morvan, A., Villalonga, B., Mi, X., Mandrà, S., Bengtsson, A., Klimov, P. V., Chen, Z., Hong, S., Erickson, C., Drozdov, I. K., Chau, J., Laun, G., Movassagh, R., Asfaw, A., Brandão, L. T. A. N., Peralta, R., Abanin, D., Acharya, R., Allen, R., … Boixo, S. (2023, April 21). Phase transition in random circuit sampling. arXiv.org. https://arxiv.org/abs/2304.11119

 

 

 

 

 

 

 

 

 

 

Comments

Popular posts from this blog

Securing High Speed Network : Challenges and Solutions in the era of 5g