QUANTUM CRYPTOGRAPHY: SECURING DATA IN THE POST-QUANTUM COMPUTING ERA – A COMPREHENSIVE EXPLORATION OF THE FUTURE OF CYBERSECURITY

Authors

  • Nadia Mustaqim Ansari Department of Electronic Engineering, Dawood University of Engineering and Technology, Karachi Author
  • Talha Tariq Department of Electronic Engineering, Dawood University of Engineering and Technology, Karachi Author
  • Rizwan Iqbal Department of Telecommunication Engineering, Dawood University of Engineering and Technology, Karachi. Author
  • Azhar Abbas M. Phil Scholar, Department of Computer science UET Lahore Author
  • Haider Abbas PhD scholar, Preston University Islamabad Pakistan Author
  • Muhammad Mohsan Zohaib Master of Information Technology, Department of Computer Science, Virtual university of Pakistan Author

DOI:

https://doi.org/10.71146/kjmr259

Keywords:

Cybersecurity, Grover's Algorithm, Post-Quantum Computing, Shor's Algorithm

Abstract

Classical cryptographic systems face a hazardous situation because quantum computing operates as a threat vector against classical systems through Shor's and Grover's algorithms. Through Shor's algorithm factoring large integers results in a breach of RSA encryption methods whereas Grover's algorithm enables substantially quicker searches of unsorted databases to diminish symmetric key encryption strength. The advanced features of quantum systems eliminate the foundation of security that classical cryptographic techniques depend on computation complexity for protection. Quantum Key Distribution (QKD) under the principles of quantum mechanics presents an effective solution through quantum cryptography for achieving secure communication. QKD stands apart from classical systems through its complete security because attempts at quantum channel interception automatically disable transmitted information and notifies sender and receiver.  The successful deployment of quantum cryptography needs solutions for its high implementation expenses coupled with noise sensitivity along with scalability limitations. The research shows it is vital to actively implement quantum-resistant cryptography now because it will protect sensitive data as the post-quantum computing period begins thus securing global cyberspace infrastructure protection systems. The study demonstrates both promising speed benefits of Hash-Based cryptography but Code-Based cryptography encounters deployment barriers because of its performance restrictions. Future studies must focus on performance development of PQC mechanisms to boost operational speed and sustain security standards.

Downloads

Download data is not yet available.

Downloads

Published

2025-02-06

Issue

Section

Engineering and Technology

How to Cite

QUANTUM CRYPTOGRAPHY: SECURING DATA IN THE POST-QUANTUM COMPUTING ERA – A COMPREHENSIVE EXPLORATION OF THE FUTURE OF CYBERSECURITY. (2025). Kashf Journal of Multidisciplinary Research, 2(02), 28-43. https://doi.org/10.71146/kjmr259

Similar Articles

1-10 of 46

You may also start an advanced similarity search for this article.