Download PDFOpen PDF in browserSecuring Communications in the Age of Quantum ComputingEasyChair Preprint 1492610 pages•Date: September 18, 2024AbstractAs quantum computing continues to advance, it poses unprecedented challenges and opportunities for securing communications. Traditional cryptographic methods, which rely on the complexity of mathematical problems like integer factorization and discrete logarithms, are increasingly vulnerable to quantum algorithms such as Shor's algorithm, which can efficiently solve these problems and potentially compromise the security of encrypted data. This paper explores the evolving landscape of cryptographic security in the context of quantum computing, highlighting the urgent need for new approaches to safeguard sensitive information. We examine post-quantum cryptography, which aims to develop algorithms resistant to quantum attacks, and quantum key distribution (QKD), a method that leverages the principles of quantum mechanics to achieve secure communication channels. The discussion includes a review of current research, implementation challenges, and the practical implications for industry and government sectors. By providing a comprehensive overview of these strategies, the paper offers insights into how we can build robust communication security frameworks in the age of quantum computing. Keyphrases: malicious activities, psychological factors, sociological factors
|