Automated Attendance System using RFID and IoT
Volume-7 | Issue-3

Smart and Explainable Credit Card Fraud Detection Using XGBoost and SHAP
Volume-7 | Issue-2

IoT Enabled Smart Bin for Waste Management with Incentivized Rewards
Volume-6 | Issue-1

An IoT-based Smart Security Locker System with OTP Verification
Volume-5 | Issue-3

DDoS Detection using Machine Learning Techniques
Volume-4 | Issue-1

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

IoT-Enabled Portable Water Quality Monitoring System
Volume-7 | Issue-3

Cloud-based Library Management and Book Tracking through the Internet of Things
Volume-4 | Issue-4

Advanced Traffic Light Controller using FPGA and ARDUINO
Volume-6 | Issue-2

An IoT-Based Vending Machine Using Blockchain for Enhanced Security
Volume-4 | Issue-3

Suspicious Human Activity Detection System
Volume-2 | Issue-4

ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3

EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2

Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4

Home / Archives / Volume-4 / Issue-2 / Article-6

Volume - 4 | Issue - 2 | june 2022

Cyber Security Analysis for Quantum Computing Open Access
V. Bindhu    410
Pages: 133-142
Full Article PDF pdf-white-icon
Cite this article
Bindhu, V.. "Cyber Security Analysis for Quantum Computing." Journal of IoT in Social, Mobile, Analytics, and Cloud 4, no. 2 (2022): 133-142
DOI
10.36548/jismac.2022.2.006
Published
21 July, 2022
Abstract

The next phase of the quantum revolution is the Quantum computer Network, a network that connects distant quantum devices using quantum links in conjunction with conventional ones. Innovation that has made way for radically improved communications and computing skills. Regular computers use and analyse data in bits (0 or 1), whereas quantum computers use qubits, or quantum bits, which can simultaneously represent other states in addition to ones and zeros. This is how quantum computers vary from traditional computers. The majority of these methods for processing information on computers rely on symmetric or asymmetric cryptography algorithms. These encryption techniques can be vulnerable to attack. We analyse the quantum key distribution (QKD) technique with in a noise-free channel. In addition, we evaluate the QKD protocol with noisy channel to simulate real scenarios on the future Internet. Therefore, it would be essential to explore using quantum cryptography, which cannot be cracked by quantum computing, to secure the standard communications infrastructure used in cyber physical systems (CPS).

Keywords

Quantum computer qubits cryptography cyber physical system

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here