Articles | Open Access | https://doi.org/10.37547/ajast/Volume05Issue11-23

Security Challenges In The Era Of Cryptography And Quantum Technologies

Nuriddin Safoev , Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan

Abstract

This article analyzes the profound impact of quantum computing on modern cryptographic systems. It explores the computational complexity theory framework to assess the vulnerability of current cryptographic mechanisms, which rely on complex mathematical problems. The analysis confirms that symmetric cryptography and hash functions remain relatively secure against quantum attacks, primarily threatened by Grover's algorithm. In contrast, widely used public-key cryptosystems are critically vulnerable to Shor's algorithm. The study concludes by examining the transition to post-quantum cryptography, highlighting the challenges of efficiency, trust, and usability that must be overcome before these new algorithms can be widely deployed.

Keywords

Cryptography, Quantum Computing, Shor’s Algorithm

References

C.-L. Wu and C.-H. Hu, “Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application,” in 2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications, IEEE, Sep. 2012, pp. 307–311. doi: 10.1109/IBICA.2012.9.

P. W. Shor, “Progress in Quantum Algorithms,” Quantum Inf Process, vol. 3, no. 1–5, pp. 5–13, Oct. 2004, doi: 10.1007/s11128-004-3878-2.

Scott Aaronson, “THE LIMITS OF Quantum,” Sci Am, vol. 298, no. 3, pp. 62–69, 2008.

V. Mavroeidis, K. Vishi, M. D., and A. Jøsang, “The Impact of Quantum Computing on Present Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 3, 2018, doi: 10.14569/IJACSA.2018.090354.

Dustin Moody, “The ship has sailed: The NIST Post-Quantum Crypto ‘Competition,’” 2017.

M. Mosca, “Cybersecurity in an Era with Quantum Computers: Will We Be Ready?,” IEEE Secur Priv, vol. 16, no. 5, pp. 38–41, Sep. 2018, doi: 10.1109/MSP.2018.3761723.

M. Mosca, “Setting the Scene for the ETSI Quantum-safe Cryptography Workshop,” in eproceedings of 1st Quantum-Safe-Crypto Workshop, Sophia Antipolis, 2013.

V. Mavroeidis, K. Vishi, M. D., and A. Jøsang, “The Impact of Quantum Computing on Present Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 3, 2018, doi: 10.14569/IJACSA.2018.090354.

Zach Kirsch and Ming Chow, “Quantum Computing: The Risk to Existing Encryption Methods,” Tufts University, Computer Systems Security, 2015.

John Proos and Christof Zalka, “Shor’s discrete logarithm quantum algorithm for elliptic curves,” arXiv preprint quant-ph/0301141, 2003.

L. K. Grover, “Quantum Mechanics Helps in Searching for a Needle in a Haystack,” Phys Rev Lett, vol. 79, no. 2, pp. 325–328, Jul. 1997, doi: 10.1103/PhysRevLett.79.325.

G. Brassard, P. Høyer, and A. Tapp, “Quantum cryptanalysis of hash and claw-free functions,” ACM SIGACT News, vol. 28, no. 2, pp. 14–19, Jun. 1997, doi: 10.1145/261342.261346.

D. J. Bernstein and T. Lange, “Post-quantum cryptography,” Nature, vol. 549, no. 7671, pp. 188–194, Sep. 2017, doi: 10.1038/nature23461.

Ruben Niederhagen and Michael Waidner, “Practical Post-Quantum Cryptography,” White Paper of Fraunhofer SIT, 2017.

D. J. Bernstein, “Post-quantum Cryptography,” in Encyclopedia of Cryptography, Security and Privacy, Cham: Springer Nature Switzerland, 2025, pp. 1846–1847. doi: 10.1007/978-3-030-71522-9_386.

S. Fehr, “Quantum Cryptography,” Found Phys, vol. 40, no. 5, pp. 494–531, May 2010, doi: 10.1007/s10701-010-9408-4.

Article Statistics

Copyright License

Download Citations

How to Cite

Nuriddin Safoev. (2025). Security Challenges In The Era Of Cryptography And Quantum Technologies. American Journal of Applied Science and Technology, 5(11), 118–121. https://doi.org/10.37547/ajast/Volume05Issue11-23