You are on page 1of 5

1

Quantum Computing and Cybersecurity

Student’s Name:

Institutional Affiliation:

Course Number and Name:

Instructor’s Name:

Assignment Due Date:


2

Quantum Computing and Cybersecurity

Conventional silicon-based computers use binary bits to represent states labeled 0 and 1

to manipulate information. Depending on the number of processor cores, these computers can

solve one or several problems. Comparatively, an incoming array of technologies called quantum

computers are based on the quantum mechanics concept of superposition (Mosca, 2015). The

concept presupposes the simultaneous existence of a particle in multiple states, which when

observed, leads to collapse to a single state. In quantum computing, superposition is represented

in quantum bits (qubits). Due to this foundational distinctiveness, quantum computers will

operate at lightning speeds, compared with standard computers. For instance, a one-qubit

quantum computer can perform two operations at once, with increasing qubits responsible for an

exponential increase in simultaneous operations at the rate of the base two raised to the number

of qubits (n) thus, 2n. Therefore, the promptness of operations and productivity will be the two

benefits of the quantum computing when applied in the chosen company.

The unique properties of quantum computing can enable a range of capabilities. In

particular, the reactive nature of the technology to snooping offers advantages to data

management companies and suppliers such as Amazon Web Services (AWS). The company is a

subsidiary of Amazon, the giant online retailer, and it is made up of a collection of remote

computing products providing virtual server services (cloud computing) to diverse customers.

Cloud computing companies are emerging as new vectors for cyberattacks, probably due to the

growing invaluableness of data. Quantum computing, on the other hand, is impervious to

malicious cyber activity based on its inherent nature to changeonce subjected to disturbances

such ascyber intrusions. Besides, modern cryptography works on the mathematical principles of

factorization to create primes with many digits that make decipherment of the encryption through
3

brute force almost impossible (Kirsch, 2015; Mosca, 2015). However, other sophisticated forms

of malicious decryption such as side-channel attacks exist, and currently, there is an

unprecedented level of vulnerability in many systems. Backed by frightening speeds that enable

the creation of highly complex algorithms, quantum technology offers enhanced cryptography

crucial to privacy and data integrity (Mosca, 2017). Therefore, quantum computers will

significantly improve the cybersecurity capabilities of AWS to identify, protect, detect, respond,

and recover from cyberattacks.

However, quantum computing is poorly understood at the moment, with little progress in

ensuring the future security of computer systems. Specifically, the superposition characteristics

of quantum computers offer a growing challenge to AWS. Due to its high speeds, quantum

computing presents a problem to cryptography (Mosca, 2015). Although standard cryptography

is secure – safe for some scattered instances, quantum computing is a whole new technology

whose threat cannot be covered by the usual quick-software patch-ups. Instead, a new form of

quantum cryptography is required with the super high speeds and other emerging infrastructure

of the new computers. Nonetheless, new cryptography systems take years to create.According to

Mosca (2017), aCanadian cryptography expert, chances of the development of a high-performing

quantum computer will increase significantly in the next two decades. If quantum cryptography

would not have developed at the time, the entire human society is at risk. Over the years,

technology has become an essential tool for human life across different spheres, including

financial, communication, business, and security. Encryption is at the base of these functions,

and thus, disruptions are inevitable once cryptography is compromised (Mosca, 2017). To AWS,

such a disruption would cause a total collapse of the company’s information systems from the
4

transaction processing system to the executive information system as communication, customer

data, and company data is exposed.


5

References

Kirsch, Z.(2015). Quantum computing: The risk to existing encryption methods. Computer

Science 116, Tufts University.

Mosca, M. (2015). Cybersecurity in the quantum world. ISACA, 2015(5), 1-4.

Mosca, M. (2017, February 10). Quantum Computing and Cybersecurity [Video].

YouTube. https://www.youtube.com/watch?v=eqLcGpGc9pE&feature=youtu.be

You might also like