Analyzing the Impact of Quantum Computing on Current Encryption Techniques
DOI:
https://doi.org/10.34306/itsdi.v5i2.662Keywords:
Quantum Computing, Encryption Techniques, SmartPLS Method, Cybersecurity, CryptographicAbstract
As the field of quantum computing progresses, the disruption to traditional encryption methods, which secure vast amounts of sensitive data, becomes an imminent threat, and conventional encryption techniques, primarily based on mathematical complexity, may no longer suffice in the era of quantum supremacy. This research systematically analyzes the vulnerabilities of current encryption standards in the face of advanced quantum computing capabilities, focusing specifically on widely-used cryptographic protocols such as RSA and AES, which are foundational to modern cybersecurity. Employing the SmartPLS method, the study models the interaction between quantum computing power and the robustness of existing encryption techniques, involving simulating quantum attacks on sample cryptographic algorithms to evaluate their quantum resistance. The findings reveal that quantum computing possesses the capacity to significantly compromise traditional encryption methods within the next few decades, with RSA encryption showing substantial vulnerabilities while AES requires considerably larger key sizes to maintain security. This study underscores the urgency for the development of quantum-resistant encryption techniques, critical to safeguarding future digital communication and data integrity, and advocates for a paradigm shift in cryptographic research and practice, emphasizing the need for 'quantum-proof' algorithms. It also contributes to the strategic planning for cybersecurity in the quantum age and provides a methodological framework using SmartPLS for further exploration into the impact of emerging technologies on existing security protocols.
Downloads
References
V. Hassija, V. Chamola, V. Gupta, S. Jain, and ..., “A survey on supply chain security: Application areas, security threats, and solution architectures,” IEEE Internet of …, 2020, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9203862/
K. Z. I, B. I. R, and S. E. L, “Artificial Intelligence and Problems of Ensuring Cyber Security.,” International Journal of …, 2019, [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=09742891&AN=142286931&h=G6WD7%2BIZNXeHvVgus%2FB%2FddTUYvwn8SouiFo8c2fDwtG0thMuAA8zrtlugbG%2FGGuBR8EdgN8E1DTo2YEcer%2FPcg%3D%3D&crl=c
M. E. Janow and P. C. Mavroidis, “Digital trade, e-commerce, the WTO and regional frameworks,” World Trade Review, vol. 18, no. S1, pp. S1–S7, 2019.
S. Latif, M. Driss, W. Boulila, S. S. Jamal, Z. Idrees, and ..., “Deep learning for the industrial internet of things (iiot): A comprehensive survey of techniques, implementation frameworks, potential applications, and future …,” Sensors. mdpi.com, 2021. [Online]. Available: https://www.mdpi.com/1355406
R. Majeed, N. A. Abdullah, M. F. Mushtaq, and R. Kazmi, “Drone security: Issues and challenges,” Parameters, vol. 2, p. 5GHz, 2021.
U. Rahardja, Q. Aini, F. P. Oganda, and V. T. Devana, “Secure Framework Based on Blockchain for E-Learning During COVID-19,” in 2021 9th International Conference on Cyber and IT Service Management (CITSM), IEEE, 2021, pp. 1–7.
F. Alfiah and A. Yondari, “Design Of Web-based Qr-code Absence At The Education Office,” IAIC Transactions on Sustainable Digital Innovation, vol. 1, no. 1, pp. 26–31, 2019.
U. Rahardja, D. Andayani, N. C. Aristo, and Z. A. Hasibuan, “Application Of Trial Finalization System As Determinants Of Final Thesis Session Results,” IAIC Transactions on Sustainable Digital Innovation, vol. 1, no. 1, pp. 1–7.
J. Amoah, A. B. Jibril, B. N. Luki, M. A. Odei, and C. Yawson, “BARRIERS OF SMES’SUSTAINABILITY IN SUB-SAHARAN AFRICA: A PLS-SEM APPROACH: Reference: Amoah, J., Jibril, AB, Luki, BN, Odei, MA & Yawson, C.(2021). Barriers of SMEs’ sustainability in sub-saharan Africa: a pls-sem approach. International Journal of Entrep,” International Journal of Entrepreneurial Knowledge, vol. 9, no. 1, pp. 10–24, 2021.
R. M. H. Thamrin, E. P. Harahap, A. Khoirunisa, A. Faturahman, and K. Zelina, “Blockchain-based Land Certificate Management in Indonesia,” ADI Journal on Recent Innovation (AJRI), vol. 2, no. 2, pp. 232–252, 2021.
D. Sinha and S. R. Chowdhury, “Blockchain-based smart contract for international business–a framework,” Journal of Global Operations and Strategic Sourcing, 2021.
X. Hu et al., “Relationship between green leaders’ emotional intelligence and employees’ green behavior: a PLS-SEM approach,” Behavioral Sciences, vol. 13, no. 1, p. 25, 2023.
W. Dai, H. Nishi, V. Vyatkin, V. Huang, and ..., “Industrial edge computing: Enabling embedded intelligence,” IEEE Industrial …, 2019, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8941000/
P. Galambos, “Cloud, fog, and mist computing: Advanced robot applications,” IEEE Syst Man Cybern Mag, 2020, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8960619/
D. Gohil and S. V. Thakker, “Blockchain-integrated technologies for solving supply chain challenges,” Modern Supply Chain Research and Applications, vol. 3, no. 2, pp. 78–97, 2021.
S. K. Singh, S. Rathore, and J. H. Park, “Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence,” Future Generation Computer Systems, 2020, [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167739X19316474
L. Tan, H. Xiao, K. Yu, M. Aloqaily, and Y. Jararweh, “A blockchain-empowered crowdsourcing system for 5g-enabled smart cities,” Comput Stand Interfaces, vol. 76, p. 103517, 2021.
S. Purnama, U. Rahardja, Q. Aini, A. Khoirunisa, and R. A. Toyibah, “Approaching The Anonymous Deployment Of Blockchain-Based Fair Advertising On Vehicle Networks,” in 2021 3rd International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, 2021, pp. 1–6.
Q. Aini, D. Manongga, U. Rahardja, I. Sembiring, and R. Efendy, “Innovation and key benefits of business models in blockchain companies,” Blockchain Frontier Technology, vol. 2, no. 2, pp. 24–35, 2023.
U. Rahardja, A. N. Hidayanto, P. O. H. Putra, and M. Hardini, “Immutable Ubiquitous Digital Certificate Authentication Using Blockchain Protocol,” Journal of Applied Research and Technology, vol. 19, no. 4, pp. 308–321, 2021.
F. Gillani, K. A. Chatha, M. S. S. Jajja, and S. Farooq, “Implementation of digital manufacturing technologies: Antecedents and consequences,” International Journal of …, 2020, [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0925527320301341
S. Sader, I. Husti, and M. Daroczi, “A review of quality 4.0: Definitions, features, technologies, applications, and challenges,” Total Quality Management & Business …, 2022, doi: 10.1080/14783363.2021.1944082.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Rama Azhari, Agita Nisa Salsabila
This work is licensed under a Creative Commons Attribution 4.0 International License.