This paper is published in Volume-6, Issue-6, 2020
Area
Computer Science & Physics
Author
Aditi Venkatesh Bhat, Aditya Iyer
Org/Univ
Independent Researcher, Bengaluru, Karnataka, India
Keywords
Quantum Computing, Cryptography, Quantum Key Distribution, Shor's Algorithm, Encryption, Decryption, Logic Gates, Boolean Tables, Qubit, Quantum Gates.
Citations
IEEE
Aditi Venkatesh Bhat, Aditya Iyer. Applications of quantum computing in IT security, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Aditi Venkatesh Bhat, Aditya Iyer (2020). Applications of quantum computing in IT security. International Journal of Advance Research, Ideas and Innovations in Technology, 6(6) www.IJARIIT.com.
MLA
Aditi Venkatesh Bhat, Aditya Iyer. "Applications of quantum computing in IT security." International Journal of Advance Research, Ideas and Innovations in Technology 6.6 (2020). www.IJARIIT.com.
Aditi Venkatesh Bhat, Aditya Iyer. Applications of quantum computing in IT security, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Aditi Venkatesh Bhat, Aditya Iyer (2020). Applications of quantum computing in IT security. International Journal of Advance Research, Ideas and Innovations in Technology, 6(6) www.IJARIIT.com.
MLA
Aditi Venkatesh Bhat, Aditya Iyer. "Applications of quantum computing in IT security." International Journal of Advance Research, Ideas and Innovations in Technology 6.6 (2020). www.IJARIIT.com.
Abstract
Observing the developments in the quantum computing, our current encryption-decryption systems such as the RSA are insubstantial. Therefore, to maintain the security and protection of data, quantum cryptography through the understanding of quantum key distribution is the future of secured user-data.