Issue |
ITM Web Conf.
Volume 76, 2025
Harnessing Innovation for Sustainability in Computing and Engineering Solutions (ICSICE-2025)
|
|
---|---|---|
Article Number | 05005 | |
Number of page(s) | 8 | |
Section | Emerging Technologies & Computing | |
DOI | https://doi.org/10.1051/itmconf/20257605005 | |
Published online | 25 March 2025 |
Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems
1 Software Development Manager, Amazon India, Ferns City, Doddanekkundi, Bengaluru, Karnataka, India
2 Associate Professor, Department of Computer Science and Engineering, Anurag Engineering College, Ananthagiri (V&M), Telangana, India
3 Assistant Professor, Department of Physics, Baosi Banikanta Kakati College, Nagaon, Barpeta, Assam, India
4 Assistant Professor, Department of CSE, J.J. College of Engineering and Technology, Tiruchirappalli, Tamil Nadu, India
5 Associate Professor & HOD, Department of Electronics and Communication Engineering, Study World College of Engineering, Coimbatore, Tamil Nadu, India
6 Professor, Department of ECE, New Prince Shri Bhavani College of Engineering and Technology, Chennai, Tamil Nadu, India
bnaresh4u@gmail.com
ynpawan@gmail.com
dhrubajyotichoudhury90@gmail.com
ambikam@jjcet.ac.in
kannadhasan.ece@gmail.com
padmavathy.r@newprinceshribhavani.com
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks. As quantum algorithms improve, pose a risk to traditional encryption solutions, and the concepts of post-quantum cryptography and quantum-safe security architectures gain momentum, it is of paramount importance that organizations stay ahead of the threat landscape. Keywords— Quantum Computing, Cryptography, Information Systems. This work reviewed the implications of quantum computing in the field of Cryptography and Data Security within Information Systems, analyzing three relevant problems encountered: secure key distribution, computational performance and cryptographic migration; Many works were unable to empirically validate or implement quantum-resistant algorithms in the real world, which represents a significant limitation to existing studies. This work tries to fill this gap by characterizing the security of post-quantum cryptography, including lattice-based, hash-based, and multivariate polynomial cryptosystems, from quantum attacks. Furthermore, we provide a multi-layered security framework that combines quantum-safe encryption, AI-powered anomaly detection, and blockchain-based authentication that would increase resilience against quantum attacks. This research bridges the gap by offering sector-specific insights into quantum security needs across key industries, including finance, healthcare, and government, facilitating the drafting of a standardized security framework and policy recommendations for a quantum-secure future. The research will help organizations and policymakers understand how they can implement scalable quantum-resistant cryptographic solutions and address potential cybersecurity risks associated with the post-quantum world.
Key words: Quantum Computing / Cryptography / Post-Quantum Cryptography (Pqc) / Quantum Key Distribution (Qkd) / Cybersecurity / Information Systems Security
© The Authors, published by EDP Sciences, 2025
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.