The Influence of Quantum Computing on Cryptographic Systems and Future-Proofing Information Security

Authors

  • Loster Zenbreth I, Research Scientist, Spain. Author

Keywords:

Quantum Computing, Cryptography, Post-Quantum Security, Shor’s Algorithm, Grover’s Algorithm, Information Security, Lattice-Based Cryptography

Abstract

 

Quantum computing represents a transformative technological shift that threatens the foundations of modern cryptographic systems. While classical encryption techniques rely on computational hardness assumptions, quantum algorithms—such as Shor’s and Grover’s—challenge these assumptions and demand novel approaches for future-proofing digital security. This paper discusses the evolution of quantum threats, classical cryptographic vulnerabilities, and the direction of post-quantum cryptography (PQC). The study synthesizes literature published, focusing on early formulations of quantum algorithms and the initial responses from cryptographic researchers. Key trends such as quantum-resistant algorithms, lattice-based schemes, and hybrid cryptographic models are explored.

References

Shor, P. W. (1994). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 124–134.

Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. Pro-ceedings of the 28th Annual ACM Symposium on Theory of Computing, 212–219.

Hoffstein, J., Pipher, J., & Silverman, J. H. (1998). NTRU: A ring-based public key cryp-tosystem. Lecture Notes in Computer Science, 1423, 267–288.

Ajtai, M. (1996). Generating hard instances of lattice problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, 99–108.

McEliece, R. J. (1978). A public key cryptosystem based on algebraic coding theory. DSN Progress Report, 44, 114–116.

Anbalaga, B. (2022). Enhancing High Availability: Technical Advancements in Ter-raform, Snapshot Management, and SIOS HA Certification. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(2), 6495–6509. https://doi.org/10.15662/IJRPETM.2022.0502003

National Institute of Standards and Technology. (2016). Post-quantum cryptog-raphy: NIST standardization call for proposals. U.S. Department of Commerce.

Bernstein, D. J. (2009). Introduction to post-quantum cryptography. In D. J. Bernstein, J. Buchmann, & E. Dahmen (Eds.), Post-Quantum Cryptography (pp. 1–14). Springer.

Mosca, M. (2018). Cybersecurity in a quantum world. In Research Handbook on Digi-tal Transformations (pp. 430–445). Edward Elgar Publishing.

Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on post-quantum cryptography. National Institute of Standards and Technology.

Peikert, C. (2014). Lattice cryptography for the internet. Proceedings of the 29th An-nual International Conference on the Theory and Applications of Cryptographic Techniques, 197–219.

National Security Agency. (2015). Quantum resistant cryptography initiative. U.S. Department of Defense.

Campagna, M. (2017). Quantum threat timeline considerations. Cloud Security Alli-ance Research Report.

Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., … Miller, C. (2019). Status report on the second round of the NIST post-quantum cryptography standardization process. National Institute of Standards and Technology.

Downloads

Published

2025-05-23

How to Cite

The Influence of Quantum Computing on Cryptographic Systems and Future-Proofing Information Security. (2025). ISCSITR-INTERNATIONAL JOURNAL OF CLOUD COMPUTING (ISCSITR-IJCC) - ISSN (Online): 3067-7378, 4(1), 7-14. https://iscsitr.in/index.php/ISCSITR-IJCC/article/view/ISCSITR-IJCC_2023_04_01_002