Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3440749.3442651acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
abstract

Security Challenges Posed by Quantum Computing on Emerging Technologies

Published: 13 May 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with efficiencies that are not possible with classical computers. Quantum computing technology has a lasting potential impact on society and a broad implications on many aspects of our lives. Communications Industry Researchers (CIR) estimates that the global quantum-computing market is expected to reach $1.9 billion in 2023, increasing to $8 billion by 2027, in spending on associated software and services. Although quantum computing has several advantages, it threatens the current cryptographic techniques, which are necessary for today’s Internet standards like the Transport Layer Security (TLS). This is due to its ability to perform infinite complex computations in parallel. Therefore, it is expected that quantum computers will be able to solve the key distribution problem and break every single cryptography and authentication algorithm based on Asymmetric cryptography, such as: RSA, ECC, and Diffie-Hellman.
    New emerging technologies such as the Internet of Things (IoT), blockchain, autonomous vehicles, 5G, Artificial Intelligence (AI) and robotics all rely on cryptography for their secure operation. Although quantum computing supports technological evolution and growth, it will pose a threat to the current progress and future development of these technologies. Therefore, cryptography and authentication techniques need improvements as introducing quantum computing would put today’s cybersecurity in serious risk. NSA and NIST proposed solutions to tackle these challenges. However, these solutions are still immature as they need major upgrade of hardware implementation. Instead, the recommendations focus on what is called post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. This talk outlines how the impact of quantum technologies on authentication, data exchange, and data storage, as well as areas where cryptography plays an essential role, such as: blockchain, 5G, IoT, and AI technologies. It investigate the possible impact of quantum technologies on these emerging technologies. Finally, it discusses some of the current quantum security solution that are devoted to protect the devices and systems in the quantum era, and mitigate quantum attacks.

    References

    [1]
    D. Adams. 1995. The Hitchhiker’s Guide to the Galaxy. San Val. http://books.google.com/books?id=W-xMPgAACAAJ
    [2]
    Ruth Ande, Bamidele Adebisi, Mohammad Hammoudeh, and Jibran Saleem. 2020. Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society 54 (2020), 101728. https://doi.org/10.1016/j.scs.2019.101728
    [3]
    Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, and Tooska Dargahi. 2020. Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications. Future Generation Computer Systems 111 (2020), 899–918.
    [4]
    CIR. 2018. Quantum Computer Market to Reach US 1.9 billion by 2023, says New CIR Report. https://cir-inc.com/news/quantum-computer-market-reach-us1-9-billion-2023-says-new-cir-report/

    Cited By

    View all
    • (2024)QUMA: Quantum Unified Medical Architecture Using BlockchainInformatics10.3390/informatics1102003311:2(33)Online publication date: 17-May-2024
    • (2023)The factors influenced by stakeholder identification in E-learning systems: A surveyJournal of King Saud University - Science10.1016/j.jksus.2023.10256635:3(102566)Online publication date: Apr-2023

    Index Terms

    1. Security Challenges Posed by Quantum Computing on Emerging Technologies
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Other conferences
            ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed Systems
            November 2020
            313 pages
            ISBN:9781450388863
            DOI:10.1145/3440749
            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 13 May 2021

            Check for updates

            Author Tags

            1. Asymmetric Cryptography
            2. Emerging Technologies
            3. Quantum Computing
            4. Security Challenges

            Qualifiers

            • Abstract
            • Research
            • Refereed limited

            Conference

            ICFNDS '20

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)77
            • Downloads (Last 6 weeks)6
            Reflects downloads up to 27 Jul 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)QUMA: Quantum Unified Medical Architecture Using BlockchainInformatics10.3390/informatics1102003311:2(33)Online publication date: 17-May-2024
            • (2023)The factors influenced by stakeholder identification in E-learning systems: A surveyJournal of King Saud University - Science10.1016/j.jksus.2023.10256635:3(102566)Online publication date: Apr-2023

            View Options

            Get Access

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format.

            HTML Format

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media