This paper is published in Volume-6, Issue-6, 2020
Area
Computer Science & Physics
Author
Aditi Venkatesh Bhat, Aditya Iyer
Org/Univ
Independent Researcher, Bengaluru, Karnataka, India
Pub. Date
18 December, 2020
Paper ID
V6I6-1224
Publisher
Keywords
Quantum Computing, Cryptography, Quantum Key Distribution, Shor's Algorithm, Encryption, Decryption, Logic Gates, Boolean Tables, Qubit, Quantum Gates.

Citationsacebook

IEEE
Aditi Venkatesh Bhat, Aditya Iyer. Applications of quantum computing in IT security, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Aditi Venkatesh Bhat, Aditya Iyer (2020). Applications of quantum computing in IT security. International Journal of Advance Research, Ideas and Innovations in Technology, 6(6) www.IJARIIT.com.

MLA
Aditi Venkatesh Bhat, Aditya Iyer. "Applications of quantum computing in IT security." International Journal of Advance Research, Ideas and Innovations in Technology 6.6 (2020). www.IJARIIT.com.

Abstract

Observing the developments in the quantum computing, our current encryption-decryption systems such as the RSA are insubstantial. Therefore, to maintain the security and protection of data, quantum cryptography through the understanding of quantum key distribution is the future of secured user-data.