Quantum and Cryptology Cause and Effect: Final Post

In the final blog post of this semester, I will be presenting the structure of my research proposal. I will start off with a flow chart overview of my proposal, and then discuss my final hypothesis. The conclusion of this post will be spent discussing methods of measurement that will be utilized in my proposal. Overall, this post is designed to be an overview of my research proposal, which will also help aid me in finalizing my research proposal as a whole.

Hypothesis
With the current differing levels of development between quantum computing and cryptography, the protection of sensitive information is a contested area that will cause users to lose faith that their information is secure online. This will remain the case until quantum resistant cryptography is further developed and can replace current standards.
 
Research
The majority of my research will be split into two separate, but interconnected, areas. The first area will be how the advancement of quantum computing will continue to make current encryption algorithms obsolete as well as how quickly and effectively quantum resistant cryptography is being developed to take the place of current methods. My second area of research will be focused on how individuals adapt their practices online when presented with a security threat to their sensitive information. The combination of these two focus areas will build an accurate picture on how likely a person is to no longer utilize the convenience of the internet when presented with a viable security threat to their privacy.
 
Methods of Measurement
The research in my proposal will be qualitative research conducted through focus groups as well as field research. My first method of measurement will be focus groups that will allow for participant discussion in order to gain insight into their perceptions of the situation, which would ultimately drive their usage. The purpose of the field research will be to analyze the usage statistics of the internet when it comes to highly sensitive areas, such as banking, as quantum computing becomes more prevalent and capable.

Leave a Reply

Your email address will not be published. Required fields are marked *