Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3440749.3442651acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
abstract

Security Challenges Posed by Quantum Computing on Emerging Technologies

Published: 13 May 2021 Publication History

Abstract

Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with efficiencies that are not possible with classical computers. Quantum computing technology has a lasting potential impact on society and a broad implications on many aspects of our lives. Communications Industry Researchers (CIR) estimates that the global quantum-computing market is expected to reach $1.9 billion in 2023, increasing to $8 billion by 2027, in spending on associated software and services. Although quantum computing has several advantages, it threatens the current cryptographic techniques, which are necessary for today’s Internet standards like the Transport Layer Security (TLS). This is due to its ability to perform infinite complex computations in parallel. Therefore, it is expected that quantum computers will be able to solve the key distribution problem and break every single cryptography and authentication algorithm based on Asymmetric cryptography, such as: RSA, ECC, and Diffie-Hellman.
New emerging technologies such as the Internet of Things (IoT), blockchain, autonomous vehicles, 5G, Artificial Intelligence (AI) and robotics all rely on cryptography for their secure operation. Although quantum computing supports technological evolution and growth, it will pose a threat to the current progress and future development of these technologies. Therefore, cryptography and authentication techniques need improvements as introducing quantum computing would put today’s cybersecurity in serious risk. NSA and NIST proposed solutions to tackle these challenges. However, these solutions are still immature as they need major upgrade of hardware implementation. Instead, the recommendations focus on what is called post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. This talk outlines how the impact of quantum technologies on authentication, data exchange, and data storage, as well as areas where cryptography plays an essential role, such as: blockchain, 5G, IoT, and AI technologies. It investigate the possible impact of quantum technologies on these emerging technologies. Finally, it discusses some of the current quantum security solution that are devoted to protect the devices and systems in the quantum era, and mitigate quantum attacks.

References

[1]
D. Adams. 1995. The Hitchhiker’s Guide to the Galaxy. San Val. http://books.google.com/books?id=W-xMPgAACAAJ
[2]
Ruth Ande, Bamidele Adebisi, Mohammad Hammoudeh, and Jibran Saleem. 2020. Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society 54 (2020), 101728. https://doi.org/10.1016/j.scs.2019.101728
[3]
Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, and Tooska Dargahi. 2020. Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications. Future Generation Computer Systems 111 (2020), 899–918.
[4]
CIR. 2018. Quantum Computer Market to Reach US 1.9 billion by 2023, says New CIR Report. https://cir-inc.com/news/quantum-computer-market-reach-us1-9-billion-2023-says-new-cir-report/

Cited By

View all
  • (2024)QUMA: Quantum Unified Medical Architecture Using BlockchainInformatics10.3390/informatics1102003311:2(33)Online publication date: 17-May-2024
  • (2023)The factors influenced by stakeholder identification in E-learning systems: A surveyJournal of King Saud University - Science10.1016/j.jksus.2023.10256635:3(102566)Online publication date: Apr-2023

Index Terms

  1. Security Challenges Posed by Quantum Computing on Emerging Technologies
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed Systems
          November 2020
          313 pages
          ISBN:9781450388863
          DOI:10.1145/3440749
          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 13 May 2021

          Check for updates

          Author Tags

          1. Asymmetric Cryptography
          2. Emerging Technologies
          3. Quantum Computing
          4. Security Challenges

          Qualifiers

          • Abstract
          • Research
          • Refereed limited

          Conference

          ICFNDS '20

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)68
          • Downloads (Last 6 weeks)10
          Reflects downloads up to 10 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)QUMA: Quantum Unified Medical Architecture Using BlockchainInformatics10.3390/informatics1102003311:2(33)Online publication date: 17-May-2024
          • (2023)The factors influenced by stakeholder identification in E-learning systems: A surveyJournal of King Saud University - Science10.1016/j.jksus.2023.10256635:3(102566)Online publication date: Apr-2023

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media