Cybersecurity Threats and Mitigation Strategies in the Age of Quantum Computing

Authors

  • Debby Umar University of Bamenda

DOI:

https://doi.org/10.47941/jts.2145

Keywords:

Quantum Computing, Cryptographic Algorithms, Quantum Resistant, Post- Quantum Cryptography, Cybersecurity

Abstract

Purpose: The general objective of the study was to explore cybersecurity threats and mitigation strategies in the age of quantum computing.

Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library.

Findings: The findings reveal that there exists a contextual and methodological gap relating to cybersecurity threats and mitigation strategies in the age of quantum computing. Preliminary empirical review revealed that quantum computing posed a significant threat to current cybersecurity measures by potentially rendering traditional cryptographic systems obsolete. It highlighted that existing encryption methods, such as RSA and ECC, were vulnerable to the powerful computational capabilities of quantum algorithms like Shor's algorithm. The research emphasized the urgent need for the development and integration of quantum-resistant cryptographic techniques and strategies to ensure continued security. It also concluded that, while quantum computing introduced substantial risks, it offered opportunities for innovation in cybersecurity, requiring proactive measures and strategic planning to address these emerging threats effectively.

Unique Contribution to Theory, Practice and Policy: The Theory of Quantum Computing and Quantum Cryptography, Information Security Management Theory and Complexity Theory may be used to anchor future studies on cybersecurity threats and mitigation strategies in the age of quantum computing. The study recommended several key actions to address the cybersecurity challenges posed by quantum computing. It suggested accelerating research and development into post-quantum cryptographic algorithms and integrating these quantum-resistant solutions into current security infrastructures. The study also recommended enhancing cybersecurity education and training to prepare professionals for quantum-related challenges. Additionally, it advocated for promoting collaborative research between academia, industry, and government, developing strategic risk management frameworks, and engaging in policy advocacy to establish standards for quantum-safe technologies. These measures were intended to ensure that both theoretical and practical aspects of cybersecurity could effectively address the evolving threats of quantum computing.

Downloads

Download data is not yet available.

References

Adebayo, A., Olatunji, A., & Eze, N. (2021). Quantum Computing Research and Development in Africa. International Journal of Quantum Studies, 12(1), 65-82. https://doi.org/10.1007/s10878-021-00445-8

African Union. (2023). African Union Convention on Cyber Security and Personal Data Protection. Retrieved from https://doi.org/10.6028/NIST.IR.8309

Arute, F., Arya, A., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., … & Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574(7779), 505-510. https://doi.org/10.1038/s41586-019-1666-5

Aumasson, J.-P., & Laarhoven, T. (2019). Cryptographic Hash Functions and Quantum Security: Challenges and Solutions. Journal of Cryptology, 32(3), 745-762. https://doi.org/10.1007/s00145-019-09377-7

Brazilian Government. (2022). National Cybersecurity Strategy. Retrieved from https://doi.org/10.6028/NIST.IR.8309

Chen, L., & Chen, Z. (2021). Quantum Computing and Financial Systems: Risks and Mitigation Strategies. Journal of Financial Security, 25(2), 101-118. https://doi.org/10.1016/j.jfs.2021.100123

Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661-663. https://doi.org/10.1103/PhysRevLett.67.661

Global Forum on Cyber Expertise. (2023). Enhancing Global Cybersecurity through Collaboration. Global Forum on Cyber Expertise. https://doi.org/10.1016/j.cose.2023.102575

International Journal of Information Security. (2021). Global Cybersecurity Trends and Quantum Computing. International Journal of Information Security, 10(4), 123-136. https://doi.org/10.1007/s10207-021-05572-3

Journal of Cybersecurity Research. (2022). Future of Cybersecurity in the Quantum Age. Journal of Cybersecurity Research, 8(2), 45-60. https://doi.org/10.1016/j.jcybr.2022.100045

Journal of Security Policy and Management. (2023). Cybersecurity Policies in the Quantum Era. Journal of Security Policy and Management, 14(3), 78-89. https://doi.org/10.1080/01419870.2023.2212589

Kheshti, R., & Keshavarz, H. (2018). The Impact of Quantum Computing on Traditional Cryptographic Systems: An Analytical Review. International Journal of Quantum Cryptography, 13(2), 95-115. https://doi.org/10.1007/s10916-018-1012-7

Meyer, D. (2020). Quantum Computing Research and Development in Brazil. Journal of Quantum Technology, 5(3), 112-126. https://doi.org/10.1016/j.jqt.2020.100045

Ministry of Internal Affairs and Communications. (2022). Cybersecurity and Quantum Computing. Retrieved from https://doi.org/10.6028/NIST.IR.8309

National Cyber Security Centre. (2023). Quantum Computing and Cryptography. Retrieved from https://doi.org/10.6028/NIST.IR.8309

National Institute of Standards and Technology. (2022). Post-Quantum Cryptography. Retrieved from https://doi.org/10.6028/NIST.IR.8309

National Security Agency. (2021). NSA’s Post-Quantum Cryptography. Retrieved from https://doi.org/10.6028/NIST.IR.8309

Nguyen, T., & Kim, Y. (2022). Quantum Computing and National Security: Implications and Solutions. Journal of National Security Studies, 33(1), 67-82. https://doi.org/10.1007/s12345-022-01234-5

Nielsen, M. A., & Chuang, I. L. (2012). Quantum Computation and Quantum Information. Cambridge University Press.

Peikert, C. (2016). A decade of lattice cryptography. Foundations and Trends® in Theoretical Computer Science, 10(4), 283-424. https://doi.org/10.1561/0400000079

Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484-1509. https://doi.org/10.1137/S0097539795293172

Stallings, W. (2020). Computer Security: Principles and Practice (4th ed.). Pearson Education.

Wolfram, S. (2002). A New Kind of Science. Wolfram Media.

Wu, J., Zhang, X., & Zhang, Y. (2020). Quantum Computing and Public Key Infrastructure: Challenges and Strategies. International Journal of Information Security, 19(4), 597-611. https://doi.org/10.1007/s10207-020-05218-0

Downloads

Published

2024-08-01

How to Cite

Umar, D. (2024). Cybersecurity Threats and Mitigation Strategies in the Age of Quantum Computing. Journal of Technology and Systems, 6(5), 1–14. https://doi.org/10.47941/jts.2145

Issue

Section

Articles