Review of Quantum Computing Advances and their Impact on Modern Cryptographic Security


Authors : Niravkumar Prajapati

Volume/Issue : Volume 10 - 2025, Issue 5 - May


Google Scholar : https://tinyurl.com/mwp5p6vd

DOI : https://doi.org/10.38124/ijisrt/25may501

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Quantum computing is poised to revolutionize numerous sectors, with cryptographic security identified as one of the most critically affected domains. For instance, Elliptic Curve Cryptography (ECC) and RSA, two traditional encryption techniques, rely on the computational difficulty of integer factorization and discrete logarithms. Nevertheless, quantum algorithms, particularly Shor's algorithm, which jeopardizes the security of existing cryptographic systems, may be able to address these problems successfully. This discovery necessitates the development of cryptographic techniques that are impervious to quantum attacks. The study of post-quantum cryptography (PQC), which includes hash-based, lattice-based, and other quantum-resistant algorithms, is becoming essential to ensuring the long-term confidentiality and integrity of data. This paper explores the basic concepts of quantum computing, their relationship to cryptographic privacy, and potential solutions for the associated security problems in the quantum age.

Keywords : Quantum Computing, Cryptographic Security, Shor’s Algorithm, RSA, ECC, Post-Quantum Cryptography, Lattice- Based Cryptography, Hash-Based Cryptography, Quantum-Resistant Encryption, Cybersecurity, and Quantum Threats.

References :

  1. S. Dixit, “The Impact of Quantum Computing on Cryptographic Security Protocols,” Adv. Nonlinear Var. Inequalities, vol. 27, no. 3, pp. 558–570, Aug. 2024, doi: 10.52783/anvi.v27.1419.
  2. V. Prajapati, “Role of Identity and Access Management in Zero Trust Architecture for Cloud Security : Challenges and Solutions,” pp. 6–18, 2025, doi: 10.48175/IJARSCT-23902.
  3. S. Singh, “Enhancing Observability and Reliability in Wireless Networks with Service Mesh Technologies,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 1, 2025, doi: 10.48175/568.
  4. S. Murri, S. Chinta, S. Jain, and T. Adimulam, “Advancing Cloud Data Architectures: A Deep Dive into Scalability, Security, and Intelligent Data Management for Next-Generation Applications,” Well Test. J., vol. 33, no. 2, pp. 619–644, 2024, [Online]. Available: https://welltestingjournal.com/index.php/WT/article/view/128
  5. O. O. Amoo, E. O. Sodiya, U. J. Umoga, and A. Atadoga, “Quantum computing and its potential impact on U.S. cybersecurity: A review: Scrutinizing the challenges and opportunities presented by quantum technologies in safeguarding digital assets,” Glob. J. Eng. Technol. Adv., vol. 18, no. 2, pp. 049–064, Feb. 2024, doi: 10.30574/gjeta.2024.18.2.0026.
  6. S. Murri, “Data Security Challenges and Solutions in Big Data Cloud Environments,” Int. J. Curr. Eng. Technol., vol. 12, no. 6, 2022, doi: https://doi.org/10.14741/ijcet/v.12.6.11.
  7. M. Gopalsamy and K. B. Dastageer, “The Role of Ethical Hacking and AI in Proactive Cyber Defense : Current Approaches and Future Perspectives,” Int. J. Innov. Sci. Res. Technol., vol. 10, no. 2, 2025, doi: https://doi.org/10.5281/zenodo.14916984.
  8. S. B. Shah, “Machine Learning for Cyber Threat Detection and Prevention in Critical Infrastructure,” J. Glob. Res. Electron. Commun., vol. 2, no. 2, pp. 1–7, 2025, doi: https://jgrec.info/index.php/jgrec.
  9. V. S. Thokala, “Improving Data Security and Privacy in Web Applications : A Study of Serverless Architecture,” Int. Res. J., vol. 11, no. 12, pp. 74–82, 2024.
  10. V. Pillai, “Anomaly Detection in Financial and Insurance Data-Systems,” J. AI-Assisted Sci. Discov., vol. 4, no. 2, 2024.
  11. A. K. Aftab Arif, Muhammad Ismaeel Khan, “An overview of cyber threats generated by AI,” Int. J. Multidiscip. Sci. Arts, vol. 3, no. 4, pp. 67–76, 2024.
  12. S. S. S. Neeli, “Securing and Managing Cloud Databases for Business - Critical Applications,” J. Eng. Appl. Sci. Technol., vol. 7, no. 1, p. 6, 2025.
  13. H. S. Chandu, “Advanced Methods for Verifying Memory Controllers in Modern Computing Systems,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 4, no. 2, pp. 377–388, 2024, doi: DOI: 10.48175/IJARSCT-19862.
  14. K. M. R. Seetharaman, “Internet of Things (IoT) Applications in SAP: A Survey of Trends, Challenges, and Opportunities,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 2, 2021, doi: DOI: 10.48175/IJARSCT-6268B.
  15. J. L. Deepak Dasaratha Rao, Sairam Madasu, Srinivasa Rao Gunturu, Ceres D’britto, “Cybersecurity Threat Detection Using Machine Learning in Cloud-Based Environments: A Comprehensive Study,” Int. J. Recent Innov. Trends Comput. Commun., vol. 12, no. 1, 2024.
  16. V. Pillai, “Enhancing Transparency and Understanding in AI Decision-Making Processes,” irejournals, vol. 8, no. 1, p. 5, 2024.
  17. V. Pillai, “Leveraging the power of Data Analysis in Automobile and Financial industries,” Int. J. Eng. Comput. Sci., vol. 12, no. 12, 2023.
  18. M. Shah, P. Shah, and S. Patil, “Secure and Efficient Fraud Detection Using Federated Learning and Distributed Search Databases,” in 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), 2025, pp. 1–6. doi: 10.1109/ICAIC63015.2025.10849280.
  19. N. Abid, “Empowering Cybersecurity : Optimized Network Intrusion Detection Using Data Balancing and Advanced Machine Learning Models,” TIJER, vol. 11, no. 12, 2024.
  20. J. Thomas, K. V. Vedi, and S. Gupta, “The Effect and Challenges of the Internet of Things (IoT) on the Management of Supply Chains,” Int. J. Res. Anal. Rev., vol. 8, no. 3, pp. 874–879, 2021.
  21. M. I. Khan, A. Arif, and A. R. A. Khan, “AI-Driven Threat Detection: A Brief Overview of AI Techniques in Cybersecurity,” BIN Bull. Informatics, vol. 2, no. 2, pp. 248–261, 2024.
  22. V. Prajapati, “Cloud-Based Database Management: Architecture, Security, challenges and solutions,” J. Glob. Res. Electron. Commun., vol. 01, no. 1, pp. 07–13, 2025.
  23. A. Kushwaha, P. Pathak, and S. Gupta, “Review of optimize load balancing algorithms in cloud,” Int. J. Distrib. Cloud Comput., vol. 4, no. 2, pp. 1–9, 2016.
  24. A. Gogineni, “Observability Driven Incident Management for Cloud-native Application Reliability,” Int. J. Innov. Res. Eng. Multidiscip. Phys. Sci., vol. 9, no. 2, 2021.
  25. A. K. Bairwa, R. Yadav, D. D. Rao, K. Naidu, Y. H C, and S. Sharma, “Implications of Cyber-Physical Adversarial Attacks on Autonomous Systems,” Int. J. Exp. Res. Rev., vol. 46, pp. 273–284, Dec. 2024, doi: 10.52756/ijerr.2024.v46.021.
  26. N. Malali and S. R. Praveen Madugula, “Robustness and Adversarial Resilience of Actuarial AI/ML Models in the Face of Evolving Threats,” Int. J. Innov. Sci. Res. Technol., vol. 10, no. 3, pp. 910–916, Mar. 2025, doi: 10.38124/ijisrt/25mar1287.
  27. S. S. S. Neeli, “Optimizing Database Management with DevOps: Strategies and Real-World Examples,” J. Adv. Dev. Res., vol. 11, no. 1, p. 8, 2020.
  28. S. Arora and S. R. Thota, “Automated Data Quality Assessment And Enhancement For Saas Based Data Applications,” J. Emerg. Technol. Innov. Res., vol. 11, pp. i207–i218, 2024, doi: 10.6084/m9.jetir.JETIR2406822.
  29. S. R. Thota, S. Arora, and S. Gupta, “Quantum-Inspired Data Processing for Big Data Analytics,” in 2024 4th International Conference on Advancement in Electronics & Communication Engineering (AECE), 2024, pp. 502–508. doi: 10.1109/AECE62803.2024.10911758.
  30. Filippo Di Giovanni, “Physical Principles Underpinning Quantum Computing,” EE TIMES, 2024.
  31. Godavari Modalavalasa, “The Role of DevOps in Streamlining Software Delivery: Key Practices for Seamless CI/CD,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 1, no. 12, pp. 258–267, Jan. 2021, doi: 10.48175/IJARSCT-8978C.
  32. A. V. Hazarika and M. Shah, “Distributed Quantum Computing Models: Study of Architectures and Models for the Distribution of Quantum Computing Tasks Across Multiple Quantum Nodes,” Int. J. Sci. Res. Arch., vol. 13, no. 2, pp. 3719–3723, Dec. 2024, doi: 10.30574/ijsra.2024.13.2.2602.
  33. Rajarshi Tarafdar, “AI-Powered Cybersecurity Threat Detection in Cloud,” Int. J. Comput. Eng. Technol., p. 266, 2025.
  34. S. Chatterjee, “Risk Management in Advanced Persistent Threats (APTs ) for Critical Infrastructure in the Utility Industry,” Int. J. Multidiscip. Res., vol. 3, no. 4, pp. 1–10, 2021.
  35. R. Arel, “Classical vs. quantum computing: What are the differences?,” TechTarget.
  36. S. Chatterjee, “Integrating Identity and Access Management for Critical Infrastructure : Ensuring Compliance and Security in Utility Systems,” Int. J. Innov. Res. Creat. Technol., vol. 8, no. 2, pp. 1–8, 2022.
  37. A. R. A. K. Muhammad Ismaeel Khan, Aftab Arif, “The Most Recent Advances and Uses of AI in Cybersecurity,” BULLET, vol. 3, no. 4, pp. 566–578, 2024.
  38. V. Madiyala, “A Review of AR / VR Technologies in Simulation- Based Learning : Current Trends and Future Directions,” vol. 1, no. 1, pp. 1–6, 2025.
  39. N. P. K. Shukla, “Cybersecurity in The Era of Quantum Computing: Challenges and Future Directions,” J. Emerg. Technol. Innov. Res., vol. 11, no. 9, pp. c843–c848, 2024.
  40. M. S. Akaash Vishal Hazarika, “Serverless Architectures: Implications for Distributed System Design and Implementation,” Int. J. Sci. Res., vol. 13, no. 12, pp. 1250–1253, 2024.
  41. P. Piyush, A. A. Waoo, M. P. Singh, P. K. Pareek, S. Kamal, and S. V. Pandit, “Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis,” J. Intell. Syst. Internet Things, vol. 24, no. 2, pp. 195–207, 2024, doi: 10.54216/JISIoT.120215.
  42. S. Duary, P. Choudhury, S. Mishra, V. Sharma, D. D. Rao, and A. Paul Aderemi, “Cybersecurity Threats Detection in Intelligent Networks using Predictive Analytics Approaches,” in 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM), IEEE, Feb. 2024, pp. 1–5. doi: 10.1109/ICIPTM59628.2024.10563348.
  43. D. Chawla and P. S. Mehra, “A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions,” Internet of Things, vol. 24, p. 100950, Dec. 2023, doi: 10.1016/j.iot.2023.100950.
  44. N. Patel, “Quantum Cryptography In Healthcare Information Systems: Enhancing Security In Medical Data Storage And Communication,” J. Emerg. Technol. Innov. Res., vol. 9, no. 8, pp. g193–g202, 2022.
  45. M. S. S Shah, “Kubernetes in the Cloud: A Guide to Observability,” DZone, 2025.
  46. V. P. Shashikant Tank Kumar Mahendrabhai Shukla, Nimeshkumar Patel, “AI Based Cyber Security Data Analytic Device,” pp. 414425–001, 2024.
  47. M. S. Samarth Shah, “Deep Reinforcement Learning For Scalable Task Scheduling In Serverless Computing,” Int. Res. J. Mod. Eng. Technol. Sci., vol. 3, no. 12, pp. 1845–1852, 2021, doi: DOI : https://www.doi.org/10.56726/IRJMETS17782.
  48. H. Zodpe and A. Shaikh, “A Survey on Various Cryptanalytic Attacks on the AES Algorithm,” Int. J. Next-Generation Comput., vol. 12, no. 2, pp. 115–123, 2021.
  49. R. PM, H. Ravani, K. Aryan, S. R. Susikar, S. Vijay, and S. M. Dsouza, “Privacy-Preserving and Efficient Border Surveillance System using Advanced Deep Learning and Cryptographic Techniques,” in 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE, Oct. 2024, pp. 733–736. doi: 10.1109/I-SMAC61858.2024.10714893.
  50. A. Jain and H. Gupta, “A Cryptographic Model for the Enhancement of Data Security,” in 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, Mar. 2024, pp. 1–6. doi: 10.1109/ICRITO61523.2024.10522303.
  51. F. Lohof, N. Gotting, and C. Gies, “Leveraging Quantum Dynamics for Physical Computing Applications,” in Proceedings - 2023 IEEE International Conference on Quantum Computing and Engineering, QCE 2023, 2023. doi: 10.1109/QCE57702.2023.10262.
  52. D. Ferrari, S. Carretta, and M. Amoretti, “A Modular Quantum Compilation Framework for Distributed Quantum Computing,” IEEE Trans. Quantum Eng., 2023, doi: 10.1109/TQE.2023.3303935.
  53. S. Ahmed, Z. Subah, and M. Z. Ali, “Cryptographic Data Security for IoT Healthcare in 5G and Beyond Networks,” in 2022 IEEE Sensors, IEEE, Oct. 2022, pp. 1–4. doi: 10.1109/SENSORS52175.2022.9967208.
  54. M. G. de Andrade, W. Dai, S. Guha, and D. Towsley, “A quantum walk control plane for distributed quantum computing in quantum networks,” in 2021 IEEE International Conference on Quantum Computing and Engineering (QCE), IEEE, Oct. 2021, pp. 313–323. doi: 10.1109/QCE52317.2021.00048.

Quantum computing is poised to revolutionize numerous sectors, with cryptographic security identified as one of the most critically affected domains. For instance, Elliptic Curve Cryptography (ECC) and RSA, two traditional encryption techniques, rely on the computational difficulty of integer factorization and discrete logarithms. Nevertheless, quantum algorithms, particularly Shor's algorithm, which jeopardizes the security of existing cryptographic systems, may be able to address these problems successfully. This discovery necessitates the development of cryptographic techniques that are impervious to quantum attacks. The study of post-quantum cryptography (PQC), which includes hash-based, lattice-based, and other quantum-resistant algorithms, is becoming essential to ensuring the long-term confidentiality and integrity of data. This paper explores the basic concepts of quantum computing, their relationship to cryptographic privacy, and potential solutions for the associated security problems in the quantum age.

Keywords : Quantum Computing, Cryptographic Security, Shor’s Algorithm, RSA, ECC, Post-Quantum Cryptography, Lattice- Based Cryptography, Hash-Based Cryptography, Quantum-Resistant Encryption, Cybersecurity, and Quantum Threats.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe