Prerna Santosh Ahire,
Ranjana P. Dahake,
- Student, Department of Computer Engineering, MET’s Bhujbal Knowledge City (Affiliated to Savitribai Phule Pune University, Pune), Nashik, Maharashtra, India
- Associate Professor, Department of Computer Engineering, MET’s Bhujbal Knowledge City (Affiliated to Savitribai Phule Pune University, Pune), Nashik, Maharashtra, India
Abstract
Quantum computing utilizing principles of superposition and entanglement is poised to revolutionize the computational landscape, presenting unprecedented challenges and opportunities across various disciplines. Among these, cryptography stands at the forefront due to its reliance on computational hardness assumptions, which Quantum algorithms, such as Grover’s and Shor’s, can efficiently exploit. This study explores theoretical foundations and practical applications of quantum-safe cryptographic primitives, such as lattice-based cryptography, hash-based signature schemes, code-based systems, and multivariate polynomial cryptography. Additionally, the discussion includes the role of Quantum Key Distribution (QKD) as a complementary tool for ensuring secure communication, emphasizing its reliance on quantum mechanics for unconditional security. Furthermore, this work presents a hybrid framework combining post-quantum cryptographic algorithms with Quantum Key Distribution protocols to ensure resilience against both classical and quantum adversaries. To clarify these concepts, detailed mathematical models, algorithmic complexity analyses, and illustrative figures are presented to demonstrate the quantum advantage and its implications for cryptographic protocols, with real-world applications such as secure financial transactions and digital identities. This study also explores the ethical and policy considerations of transitioning to quantum-secure systems, focusing on global collaboration and standardization efforts by addressing the technical, practical, and societal aspects of quantum computing in cryptography. This research aims to be a valuable reference for scholars, professionals, and decision-makers alike. The findings emphasize the critical need for developing and implementing quantum-safe solutions to safeguard the security and privacy of future digital ecosystems.
Keywords: Quantum-based computation, cryptographic security in quantum era, post-quantum encryption techniques, quantum computational algorithms, integer factorization via Shor’s method, search optimization through Grover’s technique
[This article belongs to Recent Trends in Parallel Computing ]
Prerna Santosh Ahire, Ranjana P. Dahake. Entangled Shields: Securing Digital Systems in the Quantum Cryptographic Revolution. Recent Trends in Parallel Computing. 2025; 12(02):33-43.
Prerna Santosh Ahire, Ranjana P. Dahake. Entangled Shields: Securing Digital Systems in the Quantum Cryptographic Revolution. Recent Trends in Parallel Computing. 2025; 12(02):33-43. Available from: https://journals.stmjournals.com/rtpc/article=2025/view=222278
References
- Pittenger AO. An introduction to quantum computing algorithms. Birkhäuser Boston, MA: Springer Science & Business Media; 2012 Dec 6.
- Grover LK. A fast quantum mechanical algorithm for database search. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. 1996 Jul 1; 212–219.
- Arora S, Barak B. Computational complexity: a modern approach. Cambridge: Cambridge University Press; 2009 Apr 20.
- Chen L, Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner RA, Smith-Tone D. Report on post-quantum cryptography. Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology; 2016 Apr 28.
- Gentry C. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing. 2009 May 31; 169–178.
- Weger V, Gassner N, Rosenthal J. A survey on code-based cryptography. arXiv preprint arXiv:2201.07119. 2022 Jan 18.
- Alagic G, Broadbent A, Fefferman B, Gagliardoni T, Schaffner C, St. Jules M. Computational security of quantum encryption. In Information Theoretic Security: 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers 9. Cham: Springer International Publishing; 2016; 47–71.
- Ducas L, Durmus A, Lepoint T, Lyubashevsky V. Lattice signatures and bimodal Gaussians. In Annual Cryptology Conference. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013 Aug 18; 40–56.
- Peikert C. A decade of lattice cryptography. Foundations and trends® in theoretical computer science. 2016 Mar 23; 10(4): 283–424.
- Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017 Sep 14; 549(7671): 188–94.
- Nielsen MA, Chuang IL. Quantum computation and quantum information. Cambridge: Cambridge university press; 2010 Dec 9.
- Bova F, Goldfarb A, Melko RG. Commercial applications of quantum computing. EPJ Quantum Technol. 2021 Dec 1; 8(1): 2.
- Bindel N, Brendel J, Fischlin M, Goncalves B, Stebila D. Hybrid key encapsulation mechanisms and authenticated key exchange. In Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers 10. Cham: Springer International Publishing; 2019; 206–226. 14.
- Mosca M. Cybersecurity in an era with quantum computers: Will we be ready? IEEE Secur Priv. 2018 Oct 11; 16(5): 38–41.
- Sendrier N. Post-quantum cryptography. In third international workshop, PQCrypto, Darmstadt, Germany. 2010 May 25.
- Zhang YS, Li CF, Guo GC. Quantum key distribution via quantum encryption. Phys Rev A. 2001 Jun 28; 64(2): 024302.
- Mamatha GS, Dimri N, Sinha R. Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era. arXiv preprint arXiv:2403.11741. 2024 Mar 18.
- Bagirovs E, Provodin G, Sipola T, Hautamäki J. Applications of post-quantum cryptography. arXiv preprint arXiv:2406.13258. 2024 Jun 19.
- Pirandola S, Andersen UL, Banchi L, Berta M, Bunandar D, Colbeck R, Englund D, Gehring T, Lupo C, Ottaviani C, Pereira JL. Advances in quantum cryptography. Adv Opt Photonics. 2020 Dec 14; 12(4): 1012–236.

Recent Trends in Parallel Computing
| Volume | 12 |
| Issue | 02 |
| Received | 13/05/2025 |
| Accepted | 17/05/2025 |
| Published | 04/06/2025 |
| Publication Time | 22 Days |
Login
PlumX Metrics