Protection from A Quantum Computer Cyber-Attack: survey

Main Article Content

Raya Jasim Easa
Asma Salim Yahya
Esraa Khalid Ahmad

Abstract

Encryption is required to address the ongoing issue of information security within communication networks. In the second part of the 20th century, quantum computing was first utilized to crack encryption protocols with the SHOR algorithm's development. The transformation from traditional to computational has the possibility of jeopardizing the protection of the current transaction system, even though recent improvements in QC functionality have increased the privacy and security, integrity, and accessibility of networks by shielding them from attacks like eavesdropping. This research adopts a comprehensive literature review approach to clarify the effects of quantum computers on information security. In addition, the study provides a summary of current efforts to guard against quantum attacks. Examining all suggested information security and privacy safeguards, this study examines the additional issue that quantum computers would severely damage information security.


IMG8293.jpg


Article Details

How to Cite
Raya , J. E., Yahya, A. S., & Ahmad, E. K. (2023). Protection from A Quantum Computer Cyber-Attack: survey. Technium: Romanian Journal of Applied Sciences and Technology, 5, 1–12. https://doi.org/10.47577/technium.v5i.8293
Section
Articles

References

H. Vella, “Quantum cyber security; The race for quantum-resistant cryptography; process; overview of a chip-based quantum cryptography communication system,” Eng. Technol., vol. 17, no. 1, pp. 56–59, 2022, doi: 10.1049/et.2022.0109.

A. Ali, “A Pragmatic Analysis of Pre- and Post-Quantum Cyber Security Scenarios,” in 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), 2021, pp. 686–692, DOI: 10.1109/IBCAST51254.2021.9393278.

F. Farahmand, “Introducing Hilbert Space and Quantum Cognition to Cyber Security Risk Management,” IEEE Lett. Comput. Soc., vol. 3, no. 1, pp. 1–4, 2020, doi: 10.1109/LOCS.2019.2963875.

H. T. Larasati, M. Firdaus, and H. Kim, “Quantum Federated Learning: Remarks and Challenges,” in 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2022, pp. 1–5, DOI: 10.1109/CSCloud-EdgeCom54986.2022.00010.

T. Alladi, V. Chamola, N. Sahu, and M. Guizani, “Applications of blockchain in unmanned aerial vehicles: A review,” Veh. Commun., vol. 23, p. 100249, 2020, doi: https://doi.org/10.1016/j.vehcom.2020.100249.

N. Kilber, D. Kaestle, and S. Wagner, “Cybersecurity for quantum computing,” CEUR Workshop Proc., vol. 3008, pp. 20–28, 2021.

C. Abellan and V. Pruneri, “The future of cybersecurity is quantum,” IEEE Spectr., vol. 55, no. 7, pp. 31–35, 2018, DOI: 10.1109/MSPEC.2018.8389185.

D. Rosch-Grace and J. Straub, “Analysis of the Necessity of Quantum Computing Capacity Development for National Defense and Homeland Security,” in 2021 IEEE International Symposium on Technologies for Homeland Security (HST), 2021, pp. 1–8, DOI: 10.1109/HST53381.2021.9619831.

T. H. Szymanski, “The ‘Cyber Security via Determinism’ Paradigm for a Quantum-Safe Zero Trust Deterministic Internet of Things (IoT),” IEEE Access, vol. 10, pp. 45893–45930, 2022, DOI: 10.1109/ACCESS.2022.3169137.

W.-K. Lee, K. Jang, G. Song, H. Kim, S. O. Hwang, and H. Seo, “Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications,” IEEE Access, vol. 10, pp. 59661–59674, 2022, DOI: 10.1109/ACCESS.2022.3179970.

F. Borges, P. R. Reis, and D. Pereira, “A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography,” IEEE Access, vol. 8, pp. 142413–142422, 2020, DOI: 10.1109/ACCESS.2020.3013250.

P. C. S., K. Jain, and P. Krishnan, “Analysis of Post-Quantum Cryptography for Internet of Things,” in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 2022, pp. 387–394, DOI: 10.1109/ICICCS53718.2022.9787987.

A. Vaishnavi and S. Pillai, “Cybersecurity in the Quantum Era-A Study of Perceived Risks in Conventional Cryptography and Discussion on Post Quantum Methods,” J. Phys. Conf. Ser., vol. 1964, no. 4, 2021, doi: 10.1088/1742-6596/1964/4/042002.

D. Hoornweg and P. Bhada-Tata, “A Global Review of Solid Waste Management - Review, Global Management, Solid Waste,” World Bank Urban Dev. Ser. Knowl. Pap., vol. 1, no. 11, pp. 1–116, 2012.

A. Aji, K. Jain, and P. Krishnan, “A Survey of Quantum Key Distribution (QKD) Network Simulation Platforms,” in 2021 2nd Global Conference for Advancement in Technology (GCAT), 2021, pp. 1–8, DOI: 10.1109/GCAT52182.2021.9587708.

H. Zhang, Z. Ji, H. Wang, and W. Wu, “Survey on quantum information security,” China Commun., vol. 16, no. 10, pp. 1–36, 2019, DOI: 10.23919/JCC.2019.10.001.

Y. Yao, Z. Zhai, J. Liu, and Z. Li, “Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage,” IEEE Access, vol. 7, pp. 164544–164555, 2019, DOI: 10.1109/ACCESS.2019.2952163.

S. K. H. Islam, N. Mishra, S. Biswas, B. Keswani, and S. Zeadally, “An efficient and forward-secure lattice-based searchable encryption scheme for the Big-data era,” Comput. Electr. Eng., vol. 96, p. 107533, 2021, DOI: https://doi.org/10.1016/j.compeleceng.2021.107533.

L. Li, K. Thakur, and M. L. Ali, “Potential Development on Cyberattack and Prospect Analysis for Cybersecurity,” in 2020 IEEE International IoT, Electronics and Mechatronics Conference (IEMTRONICS), 2020, pp. 1–6, DOI: 10.1109/IEMTRONICS51293.2020.9216374.

T. M. Fernández-Caramès and P. Fraga-Lamas, “Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks,” IEEE Access, vol. 8, pp. 21091–21116, 2020, DOI: 10.1109/ACCESS.2020.2968985.

T. Dhieb, H. Boubaker, S. Njah, M. Ben Ayed, and A. M. Alimi, “A novel biometric system for signature verification based on score level fusion approach,” Multimed. Tools Appl., vol. 81, no. 6, pp. 7817–7845, 2022, DOI: 10.1007/s11042-022-12140-7.

S. Shafeeq, S. Zeadally, M. Alam, and A. Khan, “Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach,” IEEE Trans. Eng. Manag., vol. 67, no. 4, pp. 1244–1255, 2020, doi: 10.1109/TEM.2019.2922710.

S. Ha, H. Lee, D. Won, and Y. Lee, “Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS,” in 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2020, pp. 1–8, DOI: 10.1109/IMCOM48794.2020.9001682.

B. Arslan, M. Ulker, S. Akleylek, and S. Sagiroglu, “A study on the use of quantum computers, risk assessment and security problems,” 6th Int. Symp. Digit. Forensic Secur. ISDFS 2018 - Proceeding, vol. 2018-January, no. March, pp. 1–6, 2018, DOI: 10.1109/ISDFS.2018.8355318.

H. Boche and V. Pohl, “On Non-Detectability of Non-Computability and the Degree of Non-Computability of Solutions of Circuit and Wave Equations on Digital Computers,” IEEE Trans. Inf. Theory, vol. 68, no. 8, pp. 5561–5578, 2022, DOI: 10.1109/TIT.2022.3172837.

A. Herman, “The Executive ’ s Guide to Quantum Computing and Quantum-secure Cybersecurity,” 2019, [Online]. Available: https://s3.amazonaws.com/media.hudson.org/Executive%27s Guide to Quantum WEB FINAL.pdf.

K.-F. Cheung, M. G. H. Bell, and J. Bhattacharjya, “Cybersecurity in logistics and supply chain management: An overview and future research directions,” Transp. Res. Part E Logist. Transp. Rev., vol. 146, p. 102217, 2021, DOI: https://doi.org/10.1016/j.tre.2020.102217.

H. Suryotrisongko and Y. Musashi, “Evaluating hybrid quantum-classical deep learning for cybersecurity botnet DGA detection,” Procedia Comput. Sci., vol. 197, pp. 223–229, 2022, DOI: https://doi.org/10.1016/j.procs.2021.12.135.

Y.-L. Gao, X.-B. Chen, Y.-L. Chen, Y. Sun, X.-X. Niu, and Y.-X. Yang, “A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain,” IEEE Access, vol. 6, pp. 27205–27213, 2018, DOI: 10.1109/ACCESS.2018.2827203.

A. Kuznetsov, A. Kiian, V. Babenko, I. Perevozova, I. Chepurko, and O. Smirnov, “New Approach to the Implementation of Post-Quantum Digital Signature Scheme,” in 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2020, pp. 166–171, DOI: 10.1109/DESSERT50317.2020.9125053.

M. D. Noel, O. V Waziri, M. S. Abdulhamid, and A. J. Ojeniyi, “Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency,” in 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), 2019, pp. 1–6, DOI: 10.1109/ICECCO48375.2019.9043192.

F. Of and C. Security, “An Introduction to Quantum Cyber Security QUANTUM WILL COMPLETELY CHANGE THE,” no. December 2021, pp. 1–11, 2022.

G. R. Mounica, G. Manimaran, L. B. Jerome, and P. Bhattacharjee, “Implementation of 5-Qubit approach-based Shor’s Algorithm in IBM Qiskit,” in 2021 IEEE Pune Section International Conference (PuneCon), 2021, pp. 1–6, DOI: 10.1109/PuneCon52575.2021.9686492.

O. Pal, M. Jain, B. K. Murthy, and V. Thakur, “Quantum and Post‐Quantum Cryptography,” in Cyber Security and Digital Forensics: Challenges and Future Trends, Wiley, 2022, pp. 45–58.

D. Tulli, C. Abellan, and W. Amaya, “Engineering High-Speed Quantum Random Number Generators,” in 2019 21st International Conference on Transparent Optical Networks (ICTON), 2019, p. 1, DOI: 10.1109/ICTON.2019.8840502.

T. M. Fernandez-Carames and P. Fraga-Lamas, “Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks,” IEEE Access, vol. 8, pp. 21091–21116, 2020, DOI: 10.1109/ACCESS.2020.2968985.

S. Wu, J. Li, F. Duan, Y. Lu, X. Zhang, and J. Gan, “The Survey on the development of Secure Multi-Party Computing in the blockchain,” in 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), 2021, pp. 1–7, DOI: 10.1109/DSC53577.2021.00008.

M. S. Ferdous, M. J. M. Chowdhury, and M. A. Hoque, “A survey of consensus algorithms in public blockchain systems for crypto-currencies,” J. Netw. Comput. Appl., vol. 182, p. 103035, 2021, DOI: https://doi.org/10.1016/j.jnca.2021.103035.

Z. Tang, Y. Qin, Z. Jiang, W. O. Krawec, and P. Zhang, “Quantum-Secure Networked Microgrids,” in 2020 IEEE Power & Energy Society General Meeting (PESGM), 2020, pp. 1–5, DOI: 10.1109/PESGM41954.2020.9281884.

K. K. Rangan et al., “Quantum Computing and Resilient Design Perspectives for Cybersecurity of Feedback Systems,” IFAC-PapersOnLine, vol. 55, no. 7, pp. 703–708, 2022, DOI: https://doi.org/10.1016/j.ifacol.2022.07.526.

T. R. Vance and A. Vance, “Cybersecurity in the Blockchain Era,” 2019 IEEE Int. Sci. Conf. Probl. Infocommunications Sci. Technol. PIC S T 2019 - Proc., pp. 107–112, 2019.

J. Sengupta, S. Ruj, and S. Das Bit, “A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT,” J. Netw. Comput. Appl., vol. 149, p. 102481, 2020, DOI: https://doi.org/10.1016/j.jnca.2019.102481.

A. Prakasan, K. Jain, and P. Krishnan, “Authenticated-Encryption in the Quantum Key Distribution Classical Channel Using Post-Quantum Cryptography,” in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 2022, pp. 804–811, DOI: 10.1109/ICICCS53718.2022.9788239.

Z. Tang, Y. Qin, Z. Jiang, W. O. Krawec, and P. Zhang, “Quantum-Secure Microgrid,” IEEE Trans. Power Syst., vol. 36, no. 2, pp. 1250–1263, 2021, DOI: 10.1109/TPWRS.2020.3011071.

D. AL-Mubayedh, M. AL-Khalis, G. AL-Azman, M. AL-Abdali, M. Al Fosail, and N. Nagy, “Quantum Cryptography on IBM QX,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019, pp. 1–6, DOI: 10.1109/CAIS.2019.8769567.

I. B. Djordjevic, “Cluster States-based Quantum Networks,” in 2020 IEEE Photonics Conference (IPC), 2020, pp. 1–2, DOI: 10.1109/IPC47351.2020.9252479.

D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman, “Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement,” Int. J. Surg., vol. 8, no. 5, pp. 336–341, 2010, doi: 10.1016/j.ijsu.2010.02.007.

M. Y. Al-darwbi, A. A. Ghorbani, and A. H. Lashkari, “KeyShield: A Scalable and Quantum-Safe Key Management Scheme,” IEEE Open J. Commun. Soc., vol. 2, pp. 87–101, 2021, DOI: 10.1109/OJCOMS.2020.3046110.

D. Edwards and D. B. Rawat, “Quantum Adversarial Machine Learning: Status, Challenges and Perspectives,” in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2020, pp. 128–133, DOI: 10.1109/TPS-ISA50397.2020.00026.

M. C. Libicki and D. Gompert, “Quantum Communication for Post-Pandemic Cybersecurity,” in 2021 13th International Conference on Cyber Conflict (CyCon), 2021, pp. 371–386, DOI: 10.23919/CyCon51939.2021.9468295.

R. Yan, Y. Wang, J. Dai, Y. Xu, and A. Q. Liu, “Quantum-Key-Distribution-Based Microgrid Control for Cybersecurity Enhancement,” IEEE Trans. Ind. Appl., vol. 58, no. 3, pp. 3076–3086, 2022, DOI: 10.1109/TIA.2022.3159314.

T. Zhou, J. Shen, X. Li, C. Wang, and J. Shen, “Quantum Cryptography for the Future Internet and the Security Analysis,” Secur. Commun. Networks, vol. 2018, p. 8214619, 2018, DOI: 10.1155/2018/8214619.

A. A. Abd El-Latif, B. Abd-El-Atty, I. Mehmood, K. Muhammad, S. E. Venegas-Andraca, and J. Peng, “Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities,” Inf. Process. Manag., vol. 58, no. 4, 2021, DOI: 10.1016/j.ipm.2021.102549.

M. Mosca, “Cybersecurity in an era with quantum computers: Will we be ready?,” IEEE Secur. Priv., vol. 16, no. 5, pp. 38–41, 2018, DOI: 10.1109/MSP.2018.3761723.

N. Edwards, J. B. Haynes, and S. B. Kiser, “Post-Quantum Security: CoreVUE Breaks Through PKI A Look at an Emerging Technology in Cybersecurity ,” J. Strateg. Innov. Sustain., vol. 16, no. 1 SE-Articles, Jun. 2021, doi: 10.33423/jsis.v16i1.4187.

K. K. Ko and E. S. Jung, “Development of cybersecurity technology and algorithm based on quantum computing,” Appl. Sci., vol. 11, no. 19, 2021, doi: 10.3390/app11199085.

V. Dixit, Y. Koshka, T. Aldwairi, and M. A. Novotny, “Comparison of quantum and classical methods for labels and patterns in Restricted Boltzmann Machines,” J. Phys. Conf. Ser., vol. 2122, no. 1, 2021, doi: 10.1088/1742-6596/2122/1/012007.

M. Masum et al., “Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?,” pp. 530–538, 2022, DOI: 10.1109/compsac54236.2022.00097.

O. S. Althobaiti and M. Dohler, “Cybersecurity Challenges Associated With the Internet of Things in a Post-Quantum World,” IEEE Access, vol. 8, pp. 157356–157381, 2020, DOI: 10.1109/ACCESS.2020.3019345.

R. Yan, J. Dai, Y. Wang, Y. Xu, and A. Q. Liu, “Quantum-Key-Distribution Based Microgrid Control for Cybersecurity Enhancement,” in 2021 IEEE Industry Applications Society Annual Meeting (IAS), 2021, pp. 1–7, DOI: 10.1109/IAS48185.2021.9677160.

V. Dixit et al., “Training a Quantum Annealing Based Restricted Boltzmann Machine on Cybersecurity Data,” IEEE Trans. Emerg. Top. Comput. Intell., vol. 6, no. 3, pp. 417–428, 2022, doi: 10.1109/TETCI.2021.3074916.

Similar Articles

<< < 2 3 4 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.