Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Journal of Computer Science and Technology Application

Enhancing Network Security with Quantum Cryptography:A Study on Future-Proofing Computer Networks AgainstQuantum Attacks Supriati, Ruli; Purwanti; Anjani, Sheila Aulia; Anugrah, Rio Wahyudin; McCarthy, Ryan
CORISINTA Vol 2 No 1 (2025): February
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/corisinta.v2i1.58

Abstract

The rapid development of quantum computing presents a significant challenge to existing cryptographic systems, such as RSA and Elliptic Curve Cryptography, which rely on the complexity of mathematical problems for security. Shor’s algorithm, which can efficiently solve these problems, emphasizes the need for cryptographic solutions that are resistant to quantum threats. This study aims to investigate the potential of Quantum Cryptography, with a specific focus on Quantum Key Distribution (QKD), to strengthen network security in response to emerging quantum computing risks. Despite the theoretical potential of QKD, there remains a gap in its practical application, particularly in terms of scalability, high implementation costs, and sensitivity to environmental factors, which have hindered its widespread adoption. The novelty of this research lies in the comprehensive approach it takes, combining theoretical analysis of QKD protocols, simulations using Qiskit, and comparisons with traditional cryptographic methods. This provides a more robust understanding of QKD effectiveness in different network scenarios. The study reveals that the BB84 protocol consistently outperforms the E91 protocol in terms of key generation efficiency and noise resilience. However, despite its unmatched security capabilities, QKD faces challenges such as scalability and implementation costs. To overcome these challenges and achieve widespread adoption, integrating QKD with post quantum cryptography and developing hybrid approaches are essential. Quantum Cryptography, particularly QKD, holds the potential to become a cornerstone for securing critical infrastructure, ensuring communication security in the quantum era.
Co-Authors ., Safinatunnaziyah Aang Hidayat Achmad Badrianto Agung Rizky Agus Salim Saputra Akhmad Jalaludin, Akhmad Alvitiana, Muhammad Dihar Andri Yanti Irmawan Anjani, Sheila Aulia Anjar Juniarno Anugrah, Rio Wahyudin Asha Fadilah Astri Wulan Sari Bhentar Ramadhan Budiarto, Mukti Danang, Danang Danti, Siti Ika Desrianti, Dewi Immaniar Desy Apriani Diah Aryani, Diah Dimas Nurhilman Dwi Adji Prasetyo Euis Nurninawati Euis Siti Nur Aisyah, Euis Siti Nur Euis Sitinur Aisyah Fae, Nahlie Fitria, Maulida Friandi, Sendy Zul Gista Melandy Hari Setiyani Henderi . Herdiana, Kivti Himawan Ilamsyah Ilamsyah Ilamsyah Ilamsyah Ilamsyah, Ilamsyah Indah Sulastri John Hendri Junaidi Junaidi Kumoro, Dwi Ferdiyatmoko Cahya Laksono Trisnantoro Lubis, Muhammad Afwa Maulida Fitria McCarthy, Ryan Mia Permatasari Mistano . Muhammad Faisal Muhammad Fikri Firdaus Muhammad Iip Suhaepi Muhammad Rehan Anwar Mukti Budiarto Mulyati Mulyati Natalia, Elisa Ananda Nina Carolina Nirwan Salim Nur Azizah Padeli Padeli Patric Bagas Agastya Adhi Putra Pawakal, Muhamad Galih Po Abas Sunarya Prasetyo, Dwi Adji Purwanti Putri Rachmanda Priyadi Qurotul Aini Rahayu Rais, Nurlaila Suci Ramdani Sofhan Ratri, Sanda Ramadhan Rawat, Bhupesh Ria Panjaitan Ricka Anggie Fadyla Royani Dewi, Elisa Santoso, Nuke Puji Lestari Saputra, Wisnu Adi Silva Ayu Lestari Siti Auliawati Adawiyah Siti Maesaroh Siti Shuhaibatul Islamiah Solahudin, Pahmi Sugeng Santoso Sugeng Widada Supriyanti, Dedeh Susanto Rahardja Tarisya Ramadhan Taufik Hidayat Thamrin, Rizky Maulana Trinugi Wira Harjanti Triyono Triyono Triyono Ulis Bella Wiranti Sri Utami Yandri, Rudy Yovina Niawan Putri, Yovina Niawan Yusuf Effendy