International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 4 | Views: 89 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper | Computer Science and Information Technology | Singapore | Volume 13 Issue 6, June 2024 | Popularity: 6 / 10


     

Quantum Computing Applications in Cryptography: Enhancing Security and Identifying Vulnerabilities

Suryanadh Kumar Ganisetti


Abstract: This research explores the applications of quantum computing in cryptography, focusing on new quantum algorithms designed to enhance cryptographic security and the potential vulnerabilities in current cryptographic methods that may arise with the advent of quantum computing. We review recent advancements, propose novel algorithms, and discuss the implications for future cryptographic systems.


Keywords: Quantum Computing, Cryptography, Security, Vulnerabilities, Quantum Algorithms, Post - Quantum Cryptography, Quantum Key Distribution, Cryptographic Protocols, Cybersecurity, Quantum Threats


Edition: Volume 13 Issue 6, June 2024


Pages: 466 - 470




Text copied to Clipboard!
Suryanadh Kumar Ganisetti, "Quantum Computing Applications in Cryptography: Enhancing Security and Identifying Vulnerabilities", International Journal of Science and Research (IJSR), Volume 13 Issue 6, June 2024, pp. 466-470, https://www.ijsr.net/getabstract.php?paperid=SR24605170901

Similar Articles

Downloads: 0

Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 1826 - 1831

Automated Penetration Testing using Large Language Models

Dhananjai Sharma, Shria Verma

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, Nepal, Volume 11 Issue 1, January 2022

Pages: 613 - 618

Cyber Security, Big Challenges in Nepal and E-Governance

Dr. Shailendra Giri, Resham Giri

Share this Article

Downloads: 2

Research Paper, Computer Science and Information Technology, Kenya, Volume 10 Issue 7, July 2021

Pages: 792 - 797

Cyber-Security Vulnerability Assessment Model for County Governments in Kenya

Kadima Victor Chitechi, Kelvin K. Omieno, Samuel Mbugua

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies, Computer Science and Information Technology, India, Volume 13 Issue 1, January 2024

Pages: 177 - 182

Ethical Hacking: Vulnerabilities & Dangers

Chanda Prasad, Dr. Binod Kumar

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 6, June 2024

Pages: 223 - 228

Unveiling Vulnerabilities in Serial Printer Point - of - Sale Systems: A Hardware Analysis Approach

Santosh Kumar Kande

Share this Article
Top