Quantum, More Power but Less Privacy

  1. Your initial research idea and your current research idea. If there are changes, tell us how they are different and why. What led you to change your focus?

I have chosen to make a complete topic change from what I was considering in week one. The main driver behind this change is that after doing more research I have found my new topic to have more information and to be more interesting. Originally, I was planning on researching the Dark Web and the positive effects it can have, especially for countries who are restricted by their governments. However, I have decided to change my research focus towards
quantum computing and its effects on the cybersecurity world. I feel that this topic applies more towards my degree and will have greater effects on my future career.
 

  1. What do you want to find out in your research area?

The general question I have is what major differences and effects the development of

Tumisu / Pixabay

quantum computing will have on cybersecurity as a whole. One main question I plan to investigate would be how quantum computing will affect encryption and privacy on the internet. A second question that would also be interesting and of value to research would be how cybersecurity would be relevant in a new quantum network.

  1. Have you already found research related to your idea? If so, what is that research?

According to Hamid Nejatollahi, the advent of quantum computing threatens to break many classical cryptography schemes, leading to innovations in public key cryptography that focus on post-quantum cryptography primitives and protocols resistant to quantum computing threats. (2018)
Nejatollahi et al. (2019, February 27). Post-Quantum Lattice-Based Cryptography Implementations. ACM Computing, 1-41. https://dl.acm.org/doi/10.1145/3292548

  1. Peruse Forsyth Library Databases and/or our library guide to identify at least three databases you could use to begin your search for related research.

Three databases I could utilize for my research would be Applied Science & Technology, Computer Science Collection, and Computer Source. I feel that these databases would be my best bet based of the collections they hold and because I have found several articles within these databases already. Each of these databases have dozens of returns when conducting searches for quantum computing and cryptology.

methodshop / Pixabay

0 thoughts on “Quantum, More Power but Less Privacy

  1. Hi Samuel. Your research topic should definitely be an interesting one as it applies directly to one of the most important subjects discussed in computing which is security and threats. According what I read on quantum computing ” the classical computers that we use today can only encode information in bits that take the value of 1 or 0. This restricts their ability. Quantum computing, on the other hand, uses quantum bits or qubits. It harnesses the unique ability of subatomic participles that allows them to exist in more than one state i.e. a 1 and a 0 at the same time. Superposition and entanglement are two features of quantum physics on which these supercomputers are based. This empowers quantum computers to handle operations at speeds exponentially higher than conventional computers and at much lesser energy consumption”.https://www.investopedia.com/terms/q/quantum-computing.asp#:~:text=Quantum%20computing%20is%20an%20area,value%20of%201%20or%200.

  2. Hi Samuel. Your research topic should definitely be an interesting one as it applies directly to one of the most important subjects discussed in computing which is security and threats. According what I read on quantum computing ” the classical computers that we use today can only encode information in bits that take the value of 1 or 0. This restricts their ability. Quantum computing, on the other hand, uses quantum bits or qubits. It harnesses the unique ability of subatomic participles that allows them to exist in more than one state i.e. a 1 and a 0 at the same time. Superposition and entanglement are two features of quantum physics on which these supercomputers are based. This empowers quantum computers to handle operations at speeds exponentially higher than conventional computers and at much lesser energy consumption”.
    https://www.investopedia.com/terms/q/quantum-computing.asp#:~:text=Quantum%20computing%20is%20an%20area,value%20of%201%20or%200.

  3. Changing your topic is a good strategy. I imagine that it would be very difficult to find enough articles on the dark web and how it can make a positive impact. The idea is fascinating, but searching for articles might prove to be discouraging.
    The impact of quantum computers on cybersecurity is dizzying. Knowing that numerous articles are available gives an incentive to pursue this topic. Furthermore, the value of this topic to anyone involved in cybersecurity is incalculable. Taking the proactive approach to prepare for attacks from quantum computers and possibly the capabilities of quantum computers to fight cyber attacks are two possible angles if you find that you need to narrow your topic.
    I did a quick search and found this:
    https://quantumxc.com/quantum-computing-impact-on-cybersecurity/
    I can’t locate it in the Forsyth library, but it may give you some ideas. I hope this helps.

  4. Samuel,
    I was interested in seeing what you found out about the dark web but I assume it would be hard to find too much on the topic. I like your idea about quantum and security. I actually had to read more into it to understand it. I look forward to reading more about it and learning more.

Leave a Reply to krhicks Cancel reply

Your email address will not be published. Required fields are marked *