Professional Documents
Culture Documents
net/publication/340439482
CITATIONS READS
0 103
2 authors, including:
Sunita Patil
K J Somaiya Institute of Engineering and Information Technology Sion
20 PUBLICATIONS 25 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Sunita Patil on 08 August 2021.
Abstract— Inception of “quantum supremacy” officially predicted by many computer scientists is breaking encryption
announced by Google has given rise to future threats to data systems. Most of the encryption systems are considered safe
security and privacy. One of the areas that we must focus on is assuming the fact that the time required to crack into the
the future threats to all applications dependent on IT, not just same is more and impossible for the conventional computing
restricted to military applications, power distribution, smart techniques to speed up the process. In this paper we will
cities but all automated infrastructures (especially critical discover some of the methods which can be perceived as a
infrastructure). The objective of the study is to make the threat to our current data security architecture.
community aware of the current and future threats to data
security and privacy using future quantum applications. The In this paper, Section II gives the background on present
paper mainly demonstrates how PKI and its key exchange encryption algorithms and systems, explaining its power and
method can be compromised easily with the help of quantum time required to get compromised in terms of time in a
computers and also proposes a solution to make our key traditional computing environment. Section III discusses the
exchange protocol secured, using QKD which ensures a hack- comparison between quantum computing and traditional
proof exchange of keys between the sender and intended computing approach. Whereas, Section IV introduces Post-
receiver. The paper also explores the research observation Quantum Cryptography. Section V talks about the corporate
areas that can be focused on, for protecting against future involvements in making a quantum computer. Section VI
threats emerging due to quantum evolution.
discusses the threats posed to the critical infrastructure.
Section VII concludes with wide-research areas and
inspiration to make our community, quantum threat-proof.
Keywords—quantum computing, data security, hacking
encryption, threat, post-quantum cryptography, PQC algorithms, II. PRESENT CRYPTOGRAPHIC ALGORITHMS AND SYSTEMS
quantum computers, Shor’s algorithm, Grover’s algorithm,
symmetric cryptography, asymmetric cryptography
This section will explain briefly the role of some of the
cryptographic algorithms in modern cryptography.
I. INTRODUCTION
Quantum Computing is inspired by the laws of Quantum A. Symmetric Key Algorithm
Physics [1]. The chief goal of quantum computing is to Symmetric Key Algorithms are the algorithms that use
perform fast processing in less amount of time. It’s like one key for encryption and decryption of the electronic
getting computing power of lakhs of computer server information. In this approach whenever a sender sends
systems combined in a single chip. Quantum computing encrypted electronic data, only the intended receiver can
represent the data in the form of states. In a typical decrypt the encrypted electronic data. Some of the symmetric
computing paradigm, the data in each physical state is key algorithm are included but not limited to AES Advanced
represented as binary “0” or “1”. However, in quantum Encryption Standard [3] [AES], Data Encryption Standard
computing paradigm, each quantum state can maintain both [4] [DES], International Data Encryption Algorithm [5]
binary “0” and “1” simultaneously, officially called Qubits [IDEA], Rivest Cipher 4 [6] [RC4], Rivest Cipher 5 [7]
(quantum bits). The concept and implementation of Qubits [RC5], Rivest Cipher 6 [8] [RC6] where RC4 is stream
opened a new horizon in the field of data processing and AI cipher and others are block ciphers.
enabling fastest computing operations till date.
Symmetric Key Algorithm is ideally used for bulk
Quantum computing is the niche approach people are encryption which includes encrypting Bigdata or for
discussing since the official declaration of quantum encrypting a column data in database. Currently the most
supremacy [2] by Google. Though this is a major break- preferred algorithm used by tech-giants is AES and IDEA.
through which can change the way how we can perform
bigdata processing, artificial intelligence, and many more;
there exists adverse effects of the same which need to be
mitigated proactively. One of the major threats that is
A Public Key Infrastructure [PKI] [20] enables users to an exposed key which the user (Bob) will use to encrypt the
transmit and receive confidential data in a secured manner data using the Receiver’s (Alice) Public Key and the same
in an unsecure network like Internet. PKI basically uses two will be decrypted by the destination by Alice via her private
keys viz. public key and private key where the public key is key as shown in Fig 1. [21]
Fig 1 – Public Key Cryptography in Action (Bob sending secure private message to Alice in an insecure network)
In short, grabbing public key alone will not help the attacker complex math required to discover private key using the
to perform decryption of ciphered message as its incomplete public key, it’s currently impossible to perform the same
without a private key. This is where hackers tried to identify due to lack of computation power in our classical computers
whether using public key, can we extract private key. Due to as shown in Fig 2.
Fig 3 – Hacker attempting to retrieve the private key using Quantum Computing Setup with Shor’s Algorithm
The solution to handle such a situation is to use Quantum receiver as shown in Fig 4. In this example, we are using
Key Distribution [QKD] [23,24]. QKD can be clubbed with BB84 key distribution scheme developed by Charles
classical communication techniques since the goal of QKD Bennett and Gilles Brassard in 1984 which is considered as
is to just generate and distribute keys to the sender and the first quantum cryptography protocol.
Once the sender and receiver receive the key, he/she can use Theorem which states that it is impossible to create an
the key for encrypting/decrypting the cipher text identical copy of an arbitrary unknown quantum states. This
respectively as shown in Fig 5. ensure that if there is any Man in the middle [MiTM] attack
being carried out, the quantum state the sender and receiver
The reason why this quantum cryptography protocol is an may receive will be different, resulting in the failure of
un-hackable key distribution protocol is because quantum decryption thus warning the sender and receiver that the
state can never be regenerated based on No-cloning channel is unsecure.