Evolution of Quantum Computing and the Challenges for Information Security

被引:0
|
作者
Reyes Alvarez, Marcos Fernando [1 ,2 ,3 ]
机构
[1] Unisangil, San Gil, Santander, Colombia
[2] Unisangil, Semillero Seguridad Informat, San Gil, Santander, Colombia
[3] Grp Hydra, San Gil, Santander, Colombia
来源
CUADERNO ACTIVA | 2016年 / 08期
关键词
quantum computing; confidentiality; entanglement; qubits; superposition;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Quantum computing started with the research work of such scientists as Max Planck and Albert Einstein. The initial idea of their studies was to solve the problem posed by black body radiation. In 1900 Planck introduced the quantum of energy, in order to describe the spectral properties of radiation, through a process of discrete distances or quantization. These research work led Planck and Einstein to enter the study of energy, molecules and atoms, and to pioneer quantum physics. Maxwell, Bohr, Louis de Broglie, Schrodinger, Podolsky, Rose, Feynman, among others, continued such path. Quantum computing is based on the use of features such as photon superposition and entanglement, which are useful for storing and sending information through the qubits. Different projects involving quantum computing may be found nowadays, which are making it a reality, but there are also threats to information security, which are not being considered, and which could damage information systems by breaking the current cryptographic rules, thus putting information confidentiality at risk in unthinkable spaces.
引用
收藏
页码:49 / 63
页数:15
相关论文
共 50 条
  • [1] Quantum computing and security of information systems
    Berezin, A. A.
    [J]. SAFETY AND SECURITY ENGINEERING II, 2007, 94 : 149 - 159
  • [2] Quantum Computing Challenges and Impact on Cyber Security
    Hadi, Hassan Jalil
    Cao, Yue
    Alshara, Mohammed Ali
    Ahmad, Naveed
    Riaz, Muhammad Saqib
    Li, Jun
    [J]. DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 333 - 343
  • [3] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514
  • [4] Data security and privacy information challenges in cloud computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 215 - 218
  • [5] Systematic Information Management in Quantum Computing: Progress and Challenges
    Sood, Vaishali
    Chauhan, Rishi Pal
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, : 1 - 13
  • [6] Information Security Management System Challenges Within a Cloud Computing Environment
    Arafat, Mais
    [J]. ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [7] Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities
    Liu, Weiqiang
    Gu, Chongyan
    O'Neill, Maire
    Qu, Gang
    Montuschi, Paolo
    Lombardi, Fabrizio
    [J]. PROCEEDINGS OF THE IEEE, 2020, 108 (12) : 2214 - 2231
  • [8] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    [J]. 2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [9] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [10] Cloud Computing and Security Challenges
    Yu, Huiming
    Powell, Nakia
    Stembridge, Dexter
    Yuan, Xiaohong
    [J]. PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,