Assessing the Impact of Quantum Computing on Data Encryption Practices and Information Security

Main Article Content

Zinah Tareq Nayyef
Najwan Abed Hasan
Yasir A. F. Alaabedi
Mayasa M. Abdulrahman
J. F. Tawfeq
Ahmed Dheyaa Radhi

Abstract

Encryption of data is a cornerstone of information security with confidentiality, integrity, and availability of sensitive information. However, the advent of quantum computing (QC) adds complexity to the classical encryption mechanisms by threatening their quantum resilience. This work looks into incorporating QC into cryptographic schemes through the evolution of an Elliptic Quantum Cryptosystem (EQC), fusing elliptic curve cryptography (ECC) and quantum annealing. The objective is to offer protection against attacks in conventional cryptographic schemes and enhance quantum attack resistance. Quantum annealing maximizes encryption through quantum fluctuations to locate best solutions, resulting in higher efficiency and reliability. The research examines top performance measures, including encryption time, decryption time, bit error rate (BER), computational efficiency, level of security, and scalability. Experimental results confirm that the proposed EQC technique has improved performance compared to existing approaches. Specifically, it takes 35 ms encryption time, 40 ms decryption time, 0.0005% BER, 80 seconds computational complexity, 9 level of security, and graded scalability as 8. These outcomes confirm the efficiency of the approach in enhancing encryption security and adaptability against quantum attacks. The problem addressed is the vulnerability of classical encryption systems to quantum advancements. By the addition of quantum-safe procedures, EQC provides a safe alternative, ensuring data confidentiality and integrity during the era of quantum. Disadvantages are the challenge in using quantum annealing and scalability problems for larger datasets. Future researches need to focus on the optimization of quantum approaches, addressing scalability issues, and studying real-world applications to ensure the generalizability of this new approach.

Article Details

Section

Articles

How to Cite

Assessing the Impact of Quantum Computing on Data Encryption Practices and Information Security (Z. T. . Nayyef, N. A. . Hasan, Y. A. F. . Alaabedi, M. M. . Abdulrahman, J. F. . Tawfeq, & A. D. . Radhi , Trans.). (2025). Applied Data Science and Analysis, 2025, 132-145. https://doi.org/10.58496/ADSA/2025/010

References

[1] R. Azhari and A. N. Salsabila, "Analyzing the impact of quantum computing on current encryption techniques," IAIC Transactions on Sustainable Digital Innovation (ITSDI) , vol. 5, no. 2, pp. 148–157, 2024.

[2] N. Nyári, "The impact of quantum computing on IT security," Biztonságtudományi Szemle , vol. 3, no. 4, pp. 25–37, 2021.

[3] Y. Baseri, V. Chouhan, and A. Ghorbani, "Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure," arXiv preprint arXiv:2404.10659 , 2024.

[4] B. Arslan, M. Ulker, S. Akleylek, and S. Sagiroglu, "A study on the use of quantum computers, risk assessment and security problems," in 2018 6th International Symposium on Digital Forensic and Security (ISDFS) , Antalya, Turkey, Mar. 2018, pp. 1–6.

[5] S. Sonko, K. I. Ibekwe, V. I. Ilojianya, E. A. Etukudoh, and A. Fabuyide, "Quantum cryptography and US digital security: A comprehensive review," Computer Science & IT Research Journal , vol. 5, no. 2, pp. 390–414, 2024.

[6] M. Möller and C. Vuik, "On the impact of quantum computing technology on future developments in high-performance scientific computing," Ethics and Information Technology , vol. 19, pp. 253–269, 2017.

[7] Y. Baseri, V. Chouhan, A. Ghorbani, and A. Chow, "Evaluation framework for quantum security risk assessment: A comprehensive study for quantum-safe migration," arXiv preprint arXiv:2404.08231 , 2024.

[8] U. Awan, L. Hannola, A. Tandon, R. K. Goyal, and A. Dhir, "Quantum computing challenges in the software industry: A fuzzy AHP-based approach," Information and Software Technology , vol. 147, p. 106896, 2022.

[9] T. L. Scholten et al., "Assessing the benefits and risks of quantum computers," arXiv preprint arXiv:2401.16317 , 2024.

[10] U. Mmaduekwe and E. Mmaduekwe, "Cybersecurity and cryptography: The new era of quantum computing," Current Journal of Applied Science and Technology , vol. 43, no. 5, pp. 41–51, 2024.

[11] N. Kilber, D. Kaestle, and S. Wagner, "Cybersecurity for quantum computing," arXiv preprint arXiv:2110.14701 , 2021.

[12] M. Sharma, V. Choudhary, R. S. Bhatia, S. Malik, A. Raina, and H. Khandelwal, "Leveraging the power of quantum computing for breaking RSA encryption," Cyber-Physical Systems , vol. 7, no. 2, pp. 73–92, 2021.

[13] G. N. Brijwani, P. E. Ajmire, and P. V. Thawani, "Future of quantum computing in cybersecurity," in Handbook of Research on Quantum Computing for Smart Environments , IGI Global, 2023, pp. 267–298.

[14] J. B. P. Glady et al., "Strengthening implementation security for quantum cryptography in the era of quantum computing by bridging theory and practice," in 2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) , Chennai, India, Apr. 2024, pp. 1–6.

[15] A. Z. Mexriddinovich, "Safeguarding digital security: Addressing quantum computing threats," The Role of Exact Sciences in the Era of Modern Development , vol. 1, no. 4, pp. 1–7, 2023.

[16] S. E. V. S. Pillai and K. Polimetla, "Analyzing the impact of quantum cryptography on network security," in 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS) , Bengaluru, India, Feb. 2024, pp. 1–6.

[17] U. Ghosh, D. Das, and P. Chatterjee, "A comprehensive tutorial on cybersecurity in quantum computing paradigm," Authorea Preprints , 2023.

Similar Articles

You may also start an advanced similarity search for this article.