Cybersecurity Threats and Mitigation Strategies in the Age of Quantum Computing
DOI:
https://doi.org/10.47941/jts.2145Keywords:
Quantum Computing, Cryptographic Algorithms, Quantum Resistant, Post- Quantum Cryptography, CybersecurityAbstract
Purpose: The general objective of the study was to explore cybersecurity threats and mitigation strategies in the age of quantum computing.
Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library.
Findings: The findings reveal that there exists a contextual and methodological gap relating to cybersecurity threats and mitigation strategies in the age of quantum computing. Preliminary empirical review revealed that quantum computing posed a significant threat to current cybersecurity measures by potentially rendering traditional cryptographic systems obsolete. It highlighted that existing encryption methods, such as RSA and ECC, were vulnerable to the powerful computational capabilities of quantum algorithms like Shor's algorithm. The research emphasized the urgent need for the development and integration of quantum-resistant cryptographic techniques and strategies to ensure continued security. It also concluded that, while quantum computing introduced substantial risks, it offered opportunities for innovation in cybersecurity, requiring proactive measures and strategic planning to address these emerging threats effectively.
Unique Contribution to Theory, Practice and Policy: The Theory of Quantum Computing and Quantum Cryptography, Information Security Management Theory and Complexity Theory may be used to anchor future studies on cybersecurity threats and mitigation strategies in the age of quantum computing. The study recommended several key actions to address the cybersecurity challenges posed by quantum computing. It suggested accelerating research and development into post-quantum cryptographic algorithms and integrating these quantum-resistant solutions into current security infrastructures. The study also recommended enhancing cybersecurity education and training to prepare professionals for quantum-related challenges. Additionally, it advocated for promoting collaborative research between academia, industry, and government, developing strategic risk management frameworks, and engaging in policy advocacy to establish standards for quantum-safe technologies. These measures were intended to ensure that both theoretical and practical aspects of cybersecurity could effectively address the evolving threats of quantum computing.
Downloads
References
Adebayo, A., Olatunji, A., & Eze, N. (2021). Quantum Computing Research and Development in Africa. International Journal of Quantum Studies, 12(1), 65-82. https://doi.org/10.1007/s10878-021-00445-8
African Union. (2023). African Union Convention on Cyber Security and Personal Data Protection. Retrieved from https://doi.org/10.6028/NIST.IR.8309
Arute, F., Arya, A., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., … & Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574(7779), 505-510. https://doi.org/10.1038/s41586-019-1666-5
Aumasson, J.-P., & Laarhoven, T. (2019). Cryptographic Hash Functions and Quantum Security: Challenges and Solutions. Journal of Cryptology, 32(3), 745-762. https://doi.org/10.1007/s00145-019-09377-7
Brazilian Government. (2022). National Cybersecurity Strategy. Retrieved from https://doi.org/10.6028/NIST.IR.8309
Chen, L., & Chen, Z. (2021). Quantum Computing and Financial Systems: Risks and Mitigation Strategies. Journal of Financial Security, 25(2), 101-118. https://doi.org/10.1016/j.jfs.2021.100123
Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661-663. https://doi.org/10.1103/PhysRevLett.67.661
Global Forum on Cyber Expertise. (2023). Enhancing Global Cybersecurity through Collaboration. Global Forum on Cyber Expertise. https://doi.org/10.1016/j.cose.2023.102575
International Journal of Information Security. (2021). Global Cybersecurity Trends and Quantum Computing. International Journal of Information Security, 10(4), 123-136. https://doi.org/10.1007/s10207-021-05572-3
Journal of Cybersecurity Research. (2022). Future of Cybersecurity in the Quantum Age. Journal of Cybersecurity Research, 8(2), 45-60. https://doi.org/10.1016/j.jcybr.2022.100045
Journal of Security Policy and Management. (2023). Cybersecurity Policies in the Quantum Era. Journal of Security Policy and Management, 14(3), 78-89. https://doi.org/10.1080/01419870.2023.2212589
Kheshti, R., & Keshavarz, H. (2018). The Impact of Quantum Computing on Traditional Cryptographic Systems: An Analytical Review. International Journal of Quantum Cryptography, 13(2), 95-115. https://doi.org/10.1007/s10916-018-1012-7
Meyer, D. (2020). Quantum Computing Research and Development in Brazil. Journal of Quantum Technology, 5(3), 112-126. https://doi.org/10.1016/j.jqt.2020.100045
Ministry of Internal Affairs and Communications. (2022). Cybersecurity and Quantum Computing. Retrieved from https://doi.org/10.6028/NIST.IR.8309
National Cyber Security Centre. (2023). Quantum Computing and Cryptography. Retrieved from https://doi.org/10.6028/NIST.IR.8309
National Institute of Standards and Technology. (2022). Post-Quantum Cryptography. Retrieved from https://doi.org/10.6028/NIST.IR.8309
National Security Agency. (2021). NSA’s Post-Quantum Cryptography. Retrieved from https://doi.org/10.6028/NIST.IR.8309
Nguyen, T., & Kim, Y. (2022). Quantum Computing and National Security: Implications and Solutions. Journal of National Security Studies, 33(1), 67-82. https://doi.org/10.1007/s12345-022-01234-5
Nielsen, M. A., & Chuang, I. L. (2012). Quantum Computation and Quantum Information. Cambridge University Press.
Peikert, C. (2016). A decade of lattice cryptography. Foundations and Trends® in Theoretical Computer Science, 10(4), 283-424. https://doi.org/10.1561/0400000079
Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484-1509. https://doi.org/10.1137/S0097539795293172
Stallings, W. (2020). Computer Security: Principles and Practice (4th ed.). Pearson Education.
Wolfram, S. (2002). A New Kind of Science. Wolfram Media.
Wu, J., Zhang, X., & Zhang, Y. (2020). Quantum Computing and Public Key Infrastructure: Challenges and Strategies. International Journal of Information Security, 19(4), 597-611. https://doi.org/10.1007/s10207-020-05218-0
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Debby Umar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.