Quantum Computing and the Transformation of Modern Cyber Defense Mechanisms

Authors

  • Akshara Nitin Bhosale

Keywords:

Cryptographic agility, Cybersecurity risk assessment, Grover’s algorithm, Harvest now decrypt later, Hybrid cryptographic architecture, NIST standardisation, Post-quantum cryptography, Quantum computing, Quantum key distribution (QKD), Shor’s algorithm

Abstract

Quantum computing constitutes a fundamental shift in computational science, with the potential to solve certain mathematical problems at speeds unattainable by classical machines. By utilising core quantum mechanical properties—such as superposition, entanglement, and interference—quantum systems challenge the computational assumptions that underpin modern public-key cryptography. Although advancements in quantum technology are expected to drive innovation in artificial intelligence, drug development, supply chain optimisation, and advanced materials research, they also pose significant risks to the security of global digital infrastructure. Widely used cryptographic protocols, including RSA, Elliptic Curve Cryptography (ECC), and Diffie–Hellman key exchange, rely on the presumed computational intractability of integer factorisation and discrete logarithm problems. However, Shor’s algorithm demonstrates that a sufficiently advanced quantum computer could solve these problems in polynomial time, effectively compromising the security of current public-key infrastructures. In parallel, Grover’s algorithm reduces the effective key strength of symmetric cryptographic systems, such as Advanced Encryption Standard (AES), by significantly accelerating brute-force search processes. This study provides an in-depth evaluation of cybersecurity risks introduced by quantum computing across public-key systems, symmetric encryption, and cryptographic hash functions. It reviews post-quantum cryptographic standards developed by the National Institute of Standards and Technology (NIST) and analyses the supporting role of Quantum key distribution (QKD), with particular attention to the BB84 protocol. A structured transition strategy is proposed, emphasising cryptographic agility, hybrid cryptographic implementations, infrastructure upgrades, and coordinated regulatory frameworks. The analysis confirms that quantum-related cybersecurity risks are grounded in mathematical proof rather than theoretical speculation. Postponing migration to quantum-resistant systems increases vulnerability across government institutions, financial networks, defense systems, and critical infrastructure. A proactive shift toward quantum-resilient cryptographic architectures is therefore essential to maintain confidentiality, integrity, and trust in digital systems over the coming decades.

References

P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124–134.

L. K. Grover, “A fast quantum mechanical algorithm for database search,” in Proc. 28th Annual ACM Symposium on Theory of Computing (STOC ’96), 1996, pp. 212–219.

D. J. Bernstein, “Post-quantum cryptography,” in Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia, Eds. Boston, MA, USA: Springer, 2011.

M. Mosca, “Cybersecurity in an era with quantum computers: Will we be ready?,” in IEEE Security & Privacy, vol. 16, no. 5, pp. 38–41, Sep.–Oct. 2018.

G. Alagic et al., “Status report on the third round of the NIST post-quantum cryptography standardization process,” NIST IR 8413, Sep. 2022.

M. Campagna, “Quantum-safe cryptography and security: An introduction, benefits, enablers and challenges,” European Telecommunications Standards Institute, Jun. 2015.

D. Aggarwal, G. Brennen, T. Lee, M. Santha, and M. Tomamichel, “Quantum attacks on bitcoin, and how to protect against them,” Ledger, vol. 3, Oct. 2018.

T. T. Huynh, T. D. Nguyen and H. Tan, “A survey on security and privacy issues of blockchain technology,” 2019 International Conference on System Science and Engineering (ICSSE), Dong Hoi, Vietnam, 2019, pp. 362–367.

R. Harishankar, M. Osborne, J. S. Arun, J. Buselli, and J. Janechek, “Crypto-agility and quantum-safe readiness,” IBM Quantum Computing Blog, Jun. 2024.

D.-T. Dam, T.-H. Tran, V.-P. Hoang, C.-K. Pham, and T.-T. Hoang, “A Survey of post-quantum cryptography: Start of a new race,” Cryptography, vol. 7, no. 3, Aug. 2023.

A. Broadbent and C. Schaffner, “Quantum cryptography beyond quantum key distribution,” Designs, Codes and Cryptography, vol. 78, no. 1, pp. 351–382, Dec. 2015.

S. Pirandola et al., “Advances in quantum cryptography,” Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, Feb. 2020.

W. Beullens et al., “Post-quantum cryptography: Current state and quantum mitigation,” ENISA Reports, 2021.

A. Hülsing, J. Rijneveld, and F. Song, “Mitigating multi-target attacks in hash-based signatures,” in Public-Key Cryptography – PKC 2016, C.-M. Cheng, K.-M. Chung, G. Persiano, and B.-Y. Yang, Eds. Berlin, Heidelberg: Springer, Feb. 2016, pp. 387–416.

Lily Chen et al., “Report on post-quantum cryptography,” NIST, 2016.

M. Mosca, and M. Piani, “2021 quantum threat timeline report,” Global Risk Institute, 2021.

D. J. Bernstein, J. Buchmann, and E. Dahmen, Eds., Post-quantum cryptography. Berlin, Germany: Springer, 2009.

A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of applied cryptography. Boca Raton, FL, USA: CRC Press, 1996.

R. P. Feynman, “Simulating physics with computers,” International Journal of Theoretical Physics, vol. 21, Nov. 1982.

D. Bernstein et al., “SPHINCS+: Submission to the NIST post-quantum cryptography project,” Semantic Scholar, 2017.

Roberto Avanzi et al., “CRYSTALS-Kyber: Algorithm specifications and supporting documentation,” Semantic Scholar, Dec. 2017.

Leo Ducas, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehle, “CRYSTALS-Dilithium: Digital signatures from module lattices,” Cryptology ePrint Archive, 2017.

D. J. Bernstein et al., “Classic McEliece: Conservative code-based cryptography,” NIST, Sep. 2024.

C. Gidney and M. Ekerå, “How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits,” arXiv, Dec. 2019.

D. Stebila, S. Fluhrer, S. Gueron,“Hybrid key exchange in TLS 1.3,” Internet Engineering Task Force (IETF), 2025.

E. Chiu, “Preparing enterprises for the quantum computing cybersecurity threats,” CSA Cloud Security Alliance, 2019.

National Security Agency (NSA), “Announcing the commercial national security algorithm suite 2.0,” Cybersecurity Advisory, Sep. 2022.

V. Chouhan, M. Aldarwbi, S. Sadeghi, A. Ghorbani, A. Chow, and R. Burko, “Assessing the quantum readiness of cryptographic standards: Recommendations toward quantum-era compliance,” Computer Standards & Interfaces, vol. 97, Apr. 2026.

Published

2026-04-08