International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 6 | Views: 123 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Analysis Study Research Paper | Computer Science and Information Technology | Singapore | Volume 13 Issue 6, June 2024 | Popularity: 5.8 / 10


     

Quantum Computing Applications in Cryptography: Enhancing Security and Identifying Vulnerabilities

Suryanadh Kumar Ganisetti


Abstract: This research explores the applications of quantum computing in cryptography, focusing on new quantum algorithms designed to enhance cryptographic security and the potential vulnerabilities in current cryptographic methods that may arise with the advent of quantum computing. We review recent advancements, propose novel algorithms, and discuss the implications for future cryptographic systems.


Keywords: Quantum Computing, Cryptography, Security, Vulnerabilities, Quantum Algorithms, Post - Quantum Cryptography, Quantum Key Distribution, Cryptographic Protocols, Cybersecurity, Quantum Threats


Edition: Volume 13 Issue 6, June 2024


Pages: 466 - 470


DOI: https://www.doi.org/10.21275/SR24605170901



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Suryanadh Kumar Ganisetti, "Quantum Computing Applications in Cryptography: Enhancing Security and Identifying Vulnerabilities", International Journal of Science and Research (IJSR), Volume 13 Issue 6, June 2024, pp. 466-470, https://www.ijsr.net/getabstract.php?paperid=SR24605170901, DOI: https://www.doi.org/10.21275/SR24605170901



Similar Articles

Downloads: 0

Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 1295 - 1298

Real-Time Data Processing and Analysis in MIS: Challenges and Solutions

Dhruv K Singhal

Share this Article

Downloads: 0

Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 1826 - 1831

Automated Penetration Testing using Large Language Models

Dhananjai Sharma, Shria Verma

Share this Article

Downloads: 0

Informative Article, Computer Science and Information Technology, India, Volume 11 Issue 1, January 2022

Pages: 1644 - 1646

Best Practices for Logs and Metrics in Software Development

Krishna Mohan Pitchikala

Share this Article

Downloads: 0

Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1936 - 1940

Zero Trust Network Segmentation

Anvesh Gunuganti

Share this Article

Downloads: 0

Research Paper, Computer Science and Information Technology, United States of America, Volume 8 Issue 6, June 2019

Pages: 2454 - 2456

Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools

Satheesh Reddy Gopireddy

Share this Article



Top