Smart City Gnosys

Smart city article details

Title Quantum Computing In Data Security: A Critical Assessment
ID_Doc 43986
Authors Khan S.; Jain C.; Rathi S.; Maravi P.K.; Jhapate A.; Joshi D.
Year 2023
Published Quantum Computing in Cybersecurity
DOI http://dx.doi.org/10.1002/9781394167401.ch22
Abstract In many fields, such as data search from large data repositories, prime factorization, number theory, cybersecurity, polynomial evaluation, interpolation, machine learning, and artificial intelligence, highly intensive computing tasks are required. Quantum computing is an emerging technology that can perform these tasks. Any computational issue that can be resolved by a classical computer can also be resolved more effectively by a quantum computer. Out of all of these problem areas, network security is one where quantum computing is most directly related, with key management and distribution being its two main applications that are used in a variety of ways. The principles of quantum computing, as well as several key distribution strategies based on quantum computing, are briefly explained in this study. Moreover, this article focuses on computational engineering applications of quantum computing as well. Future dangers to data security and privacy have arisen as a result of the official announcement of "quantum supremacy" by Google. Future risks to all IT-dependent applications, including but not limited to smart cities, power distribution, and military applications, must be one of our main areas of focus (especially critical infrastructure). The study's goal is to raise public awareness of the present and foreseeable risks to data security and privacy posed by potential quantum applications. The article primarily demonstrates how PKI and its key exchange mechanism may be readily broken with the aid of quantum computers and also suggests a solution to make our key exchange protocol secure, utilizing QKD, which guarantees a secure key exchange between the sender and the intended recipient. The report also looks at potential areas for research observation that may be prioritized to guard against potential risks brought about by quantum development. © 2023 Scrivener Publishing LLC.
Author Keywords Asymmetric cryptography; Hacking encryption; Post-quantum cryptography; Symmetric cryptography; Threat


Similar Articles


Id Similarity Authors Title Published
47780 View0.893AlMudaweb A.; Elmedany W.Securing Smart Cities In The Quantum Era: Challenges, Solutions, And Regulatory ConsiderationsIET Conference Proceedings, 2023, 44 (2023)
44005 View0.888Mujlid H.M.; Alshahrani R.Quantum-Driven Security Evolution In Iot: Ai-Powered Cryptography And Anomaly DetectionJournal of Supercomputing, 81, 9 (2025)
43985 View0.886Dhanaraj R.K.; Rajasekar V.; Hafizul Islam S.K.; Balusamy B.; Hsu C.-H.Quantum Blockchain: An Emerging Cryptographic ParadigmQuantum Blockchain: An Emerging Cryptographic Paradigm (2022)
27530 View0.876Das S.; Das A.Future Perspective Of Quantum Cryptography For Smart Cities Of The 21St CenturyHandbook of Research on Quantum Computing for Smart Environments (2023)
4323 View0.874Chawla D.; Mehra P.S.A Roadmap From Classical Cryptography To Post-Quantum Resistant Cryptography For 5G-Enabled Iot: Challenges, Opportunities And SolutionsInternet of Things (Netherlands), 24 (2023)
47756 View0.872Khan M.A.; Khan M.A.Securing Iot In The Post-Quantum Era: Implementation, Challenges And Future DirectionsIEEE Communications Standards Magazine (2025)
47770 View0.868Bera B.; Das A.K.; Sikdar B.Securing Next-Generation Quantum Iot Applications Using Quantum Key DistributionIEEE Internet of Things Magazine, 8, 1 (2025)
43994 View0.864Granados G.; Velasquez W.; Cajo R.; Antonieta-Alvarez M.Quantum Key Distribution In Multiple Fiber Networks And Its Application In Urban Communications: A Comprehensive ReviewIEEE Access, 13 (2025)
17019 View0.858Al Maqousi A.; Basu K.Cybersecurity Framework For Smart Cities: Leveraging Quantum Cryptography And Blockchain2025 1st International Conference on Computational Intelligence Approaches and Applications, ICCIAA 2025 - Proceedings (2025)
46000 View0.858Meng X.; Yu X.; Chen W.; Zhao Y.; Zhang J.Residual-Adaptive Key Provisioning In Quantum-Key-Distribution Enhanced Internet Of Things (Q-Iot)2020 International Wireless Communications and Mobile Computing, IWCMC 2020 (2020)