Visible to the public A Study on the Use of Quantum Computers, Risk Assessment and Security Problems

TitleA Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Publication TypeConference Paper
Year of Publication2018
AuthorsArslan, B., Ulker, M., Akleylek, S., Sagiroglu, S.
Conference Name2018 6th International Symposium on Digital Forensic and Security (ISDFS)
Date Publishedmar
ISBN Number 978-1-5386-3449-3
Keywordscomposability, computational complexity, computer based solutions, Computers, cryptography, cryptosystems, Encryption, high complexity value, high performance, high-resolution image, information storage, Internet, large-scale data processing, long processing times, Metrics, optimisation, optimization problems, pubcrawl, quantum approaches, quantum computer, quantum computers, quantum computing, quantum computing security, Quantum mechanics, quantum physics, resilience, Resiliency, risk assessment, Scalability, security, security problems, simultaneous operation, Threat, wide solution space
Abstract

In the computer based solutions of the problems in today's world; if the problem has a high complexity value, different requirements can be addressed such as necessity of simultaneous operation of many computers, the long processing times for the operation of algorithms, and computers with hardware features that can provide high performance. For this reason, it is inevitable to use a computer based on quantum physics in the near future in order to make today's cryptosystems unsafe, search the servers and other information storage centers on internet very quickly, solve optimization problems in the NP-hard category with a very wide solution space and analyze information on large-scale data processing and to process high-resolution image for artificial intelligence applications. In this study, an examination of quantum approaches and quantum computers, which will be widely used in the near future, was carried out and the areas in which such innovation can be used was evaluated. Malicious or non-malicious use of quantum computers with this capacity, the advantages and disadvantages of the high performance which it provides were examined under the head of security, the effect of this recent technology on the existing security systems was investigated.

URLhttps://ieeexplore.ieee.org/document/8355318
DOI10.1109/ISDFS.2018.8355318
Citation Keyarslan_study_2018