Evolution and Advancement of Quantum Computing in The Era of Networking and Cryptography
Evolution and Advancement of Quantum Computing in The Era of Networking and Cryptography
Abstract— Over the past decade, we've witnessed a remarkable capabilities, surpassing even the most powerful abacuses and
and rapid surge in the realm of high-performance computing. supercomputers [2].
The entire computing landscape, encompassing cloud and fog
computing, has seen an unprecedented surge in popularity. The development of a functional quantum computer hinges
Cloud computing, a system interconnecting myriad components,
delivers application, data, and storage services over the internet.
on maintaining a "quantum state in superposition" for a
Quantum computing, on the other hand, harnesses the sufficient duration to perform multiple operations.
remarkable phenomena of quantum mechanics like Superposition, when it interacts with a measuring system
superposition and entanglement for computational purposes. component, undergoes decoherence and shifts to a classical
This paper serves as an expansive introduction to the bit, losing its intermediate state. Quantum computing devices
fundamental principles, historical evolution, and breakthroughs aim to preserve quantum states against decoherence while
in quantum computing, shedding light on its applications in ensuring read accessibility. Diverse strategies are being
network technology and cryptography. Moreover, it delves into explored, including more robust quantum processes and
the exciting potential for future game development empowered improved error detection methods [3]. Quantum computing is
by quantum technology. In particular, we'll uncover the latest
strides in cognitive networking and cryptography, drawing
currently in the developmental phase, with researchers
attention to the cutting-edge developments. Finally, we'll worldwide dedicated to devising models for computing
scrutinize the on-going research endeavours and lingering hardware, architectures, and software that will make
questions demanding further exploration within the dynamic computing accessible to end-users. This study delves into the
realm of quantum computing. historical evolution of quantum computing, its core principles,
recent advancements in quantum networks and cryptography.
Keywords— Quantum Computing, Network, Cryptography, high Our goal is to investigate unresolved issues in quantum
performance computing and fog computing computing that have yet to be thoroughly examined or
researched[4].
The study is structured into six main sections. The initial
I. INTRODUCTION segment discusses the quantum. Section 2 deals with quantum
mechanics. Section 3 deals with quantum networking and
The exponential growth of high-performance computing section 4 deals with quantum cryptography respectively. The
has its roots in cluster computing and has evolved with the paper concludes in Section 5, outlining the future of quantum
emergence of grid, cloud, and fog computing. Today, computing.
significant research efforts are underway in the domain of
quantum computing. The main goal of this study is to advance II. QUANTUM MECHANISM
the computing process, enhance the speed of intermediate
networks, and bolster security measures. Researchers believe Quantum computers are engineered based on the principles
that quantum physics theory will be instrumental in of quantum theory, a branch of physics, and are often hailed as
developing advanced computing paradigms that deliver high- the computers of the future. Traditional computers, such as
quality services to end-users, ensuring reliability and desktops, laptops, tablets, and smartphones, are predominantly
security[1].
binary computers, operating on binary functions using ones
Quantum computing is a realm of research dedicated to the
creation of computer technology based on the principles of and zeros (1, 0). These devices employ transistors within their
quantum theory, which elucidates the behavior of energy and processors, which can exist in either an activated or
matter at the nuclear and subatomic level. If quantum deactivated state, representing the binary choices of on (1) or
computing becomes viable, it will revolutionize computing off (0). The ensuing stages of computation are exclusively
discernible to these binary digits (1, 0). Computer programs
817
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
harness the remarkable capacity to create complex software using entangled quantum particles, exemplifying a
using a limited set of basic statements like "if," "this," "then," phenomenon. In such a quantum network, distinct particles,
"that," and "scenario," often expressed in the language of even when separated by vast distances, can exist in a unique
binary numbers, or bits[5]. state enabling instantaneous information transfer between
Quantum computers, on the other hand, employ qubits them.
(quantum bits) rather than traditional bits. Qubits exhibit an
additional capability absent in classical bits. While classical
computing relies on binary digits (0 or 1), quantum computing
introduces a paradigm shift. In quantum computing, a system
can exist in any state, encompassing both zero and one
simultaneously [6]. This distinctive feature enables developers
to utilize both conditions concurrently when crafting logical
operations, potentially leading to expedited computation
speeds. Quantum computers employ qubits to replicate the
behaviour of surrounding particles, resulting in significantly Fig. 1 Hacker tampering communication in quantum networks[8]
enhanced computational speed and capability compared to
binary computers. One of the distinguishing features of quantum networking
is its robust resistance to hacking attempts, ensuring data
security. When qubits are employed to transmit confidential
A. Binary Computing vs. Quantum Computing messages, any interference by hackers is swiftly detected by
both the sender and the recipient, offering a reassuring layer
In the realm of binary computing, operations are of security as shown in Fig. 1.
systematically conducted one by one, allowing for the The quantum networks of the future must also contend
possibility of obtaining multiple results simultaneously. with queuing delays using quantum queuing delay (QQD) [9]
Quantum computing, however, redefines the operational model for the analysis of data queuing delays, leveraging
mechanism [7]. dynamic programming to quantify limited storage space. The
The key distinction is that while a binary computer model facilitates the formulation of a policy based on
actively computes and verifies outcomes, a quantum computer cognitive memory, ultimately minimizing queuing delays,
seemingly anticipates results in advance. For instance, providing superior performance in policy implementation .
Google's quantum computer has showcased significantly Furthermore, quantum networks hold immense potential
accelerated computational speeds compared to conventional for secure data transmission across a spectrum of applications,
binary computers. However, the practical use of quantum including government institutions, universities, hospitals,
computers in residential settings is currently limited due to schools, offices, airports, and even elections, promising
their requirement of operating at frigid temperatures ranging efficient and secure voting processes with minimal risk of
from 0 to -5 Celsius. Temperatures exceeding this threshold tampering[10].
may render a quantum computer inoperable.
• Untangled Network
III. QUANTUM NETWORKING
The concept of an "untangled network" plays a pivotal
Quantum networks are redefining the boundaries of role in the domain of quantum key distribution, preserving the
modern communication and computation, presenting both confidentiality of sensitive data on classical networks for
extended durations. Although its coverage is limited, even
challenges and extraordinary prospects at the forefront of
satellite-based deployment remains a viable option. While it
intellectual and technical innovation, encompassing quantum may not shine in complex multi-hop scenarios, this network
processing and communication. These networks, with a architecture excels in point-to-point settings.
multitude of channels and nodes, necessitate novel
methodologies to create and assess quantum coherence and • Entangled Network
entanglement, giving rise to a sense of fascination and
excitement in those delving into the realm of quantum On the flip side, the entangled network opens doors to a
technologies[8]. multitude of operations by enabling the generation of secret
random numbers while preserving data privacy. However, it
Quantum networking, in its simplest terms, replaces doesn't provide the capability for long-distance message
conventional radio waves with quantum flags for data transmission through quantum repeaters or robust network
transmission. This innovative approach opens doors to the infrastructure. Quantum networking hinges on the unique
seamless exchange of information across a global network
818
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
nature of qubits, which defy replication in contrast to classical cryptography ensures that the data is highly secure, unlike
bits. mathematical encryption.
IV. QUANTUM CRYPTOGRAPHY
Quantum Cryptography employs photons to transport data
Quantum cryptography refers to the understanding of between servers, enabling both sides to ascertain the security
creating quantum-based assets for various cryptographic of the key. Initially, a server transmits photons through a filter
purposes. It is currently not possible to create near-identical that is marked with certain bit designations. Subsequently, the
copies of encrypted data stored in a quantum state. Quantum photons proceed towards the recipient, who is responsible for
Cryptography utilizes the concepts of quantum physics to arranging the polarizers. Subsequently, the second server
encrypt data through key distribution and the use of photons. transmits the data back to the initial server, providing them
Quantum encryption enables two servers to connect with the precise sequence of the polarizers. This information
securely without being detected by eavesdroppers who then transforms into a key within the obtained findings.
possess unbounded computational capabilities. Quantum
A. OpenFlow Protocol in Quantum Cryptography
TABLE I
FINDINGS ON QUANTUM CRYPTOGRAPHY
This enables the establishment of virtual encoding automated speech recognition methodologies namely dynamic
channels that may be configured to provide the required perceptron and vocal activity detection.
degree of QoS for security purposes. This research will B. Applications of Quantum Cryptography
facilitate the advancement of quantum cryptography in terms • Photons are transmitted between apartments using a
of service provision and aid in its transition to an industrial fiber connection and two beam splitters to convey the
scale [11]. This protocol introduces two mobile-adapted polarity of each individual photon.
819
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
• They are not verifiable and lack user-friendliness or compelling hackers to breach multiple pathways
convenience. simultaneously [16, 17].
• It requires fewer resources for maintenance.
• The technology ensures the protection of confidential F. Benefits of Quantum Cryptography
information and prevents unauthorized access to The advantages of Quantum Cryptography as shown in figure
important credentials. 2. are manifold:
• Encryption produces ciphertext that is the same
length as the plaintext, making it suitable for use as a • It draws its strength from the principles of physics,
one-time pad. The security of the cryptographic offering unparalleled security for the transmission of
algorithm is impregnable. confidential information comspared to mathematical
encryption.
C. Limitations Quantum cryptography • Quantum physics renders it virtually impervious to
The understanding of quantum phenomena is incomplete hacking attempts [18].
and not fully comprehended in all instances. The • It's a resource-efficient solution, demanding minimal
transmission of huge documents is challenging due to the fact resources.
that the size of the solutions is greater than that of symmetric
• Quantum data has an innate ability to self-modify
cryptographic systems.
when subjected to eavesdropping attempts.
D. Quantum Cryptography Types
1) Symmetric Key Cryptography: Symmetric Key
820
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
As a future scope, the concept of quantum computing can [14] Sandberg, M., Brink, M., Adiga, V., Chavez-Garcia, J., Chow, J., Paik,
H., & Orcutt, J. Low temperature measurement of SiGe properties for
be integrated with designing of power systems for 6G wireless
superconducting quantum circuits. APS, 2019, X29-007.
networks. [15] Wehner, S., Elkouss, D., & Hanson, R. Quantum internet: A vision for
the road ahead. Science, 2018, 362(6412).
REFERENCES [16] Dai, W., Peng, T., & Win, M. Z. Quantum queuing delay. IEEE Journal
[1] M. Alghadeer, E. Aldawsari, R. Selvarajan, K. Alutaibi, S. Kais and F. H. on Selected Areas in Communications, 2020, 38(3), 605-618.
Alharbi, "Psitrum and Universal Simulation of Quantum Computers," [17] Guo, X., Breum, C. R., Borregaard, J., Izumi, S., Larsen, M. V.,
2022 IEEE International Conference on Quantum Computing and Gehring, T., ... & Andersen, U. L. Distributed quantum sensing in a
Engineering (QCE), Broomfield, CO, USA, 2022, pp. 837-838, doi: continuous-variable entangled network. Nature Physics, 2020, 16(3),
10.1109/QCE53715.2022.00137. 281-284.
[2] S. Lokes, C. S. J. Mahenthar, S. P. Kumaran, P. Sathyaprakash and V. [18] Donetti, L., Hurtado, P. I., & Munoz, M. A. Entangled networks,
Jayakumar, "Implementation of Quantum Deep Reinforcement Learning synchronization, and optimal network topology. Physical Review
Using Variational Quantum Circuits," 2022 International Conference on Letters, 2005, 95(18), 188701.
Trends in Quantum Computing and Emerging Business Technologies [19] Wilkinson, K. N., Cope, T. P., &Pirandola, S. Exploring the Limitations
(TQCEBT), Pune, India, 2022, pp. 1-4, doi: of Quantum Networking through Butterfly‐Based Networks. Advanced
10.1109/TQCEBT54229.2022.10041479. Quantum Technologies, 2020, 3(3), 1900103.
[3] H. C. Watanabe, R. Raymond, Y. -Y. Ohnishi, E. Kaminishi and M. [20] Barabasi, S., Barrera, J., Bhalani, P., Dalvi, P., Dimiecik, R., Leider, A.,
Sugawara, "Optimizing Parameterized Quantum Circuits with Free-Axis ... & Tappert, C. C. Student user experience with the IBM Qiskit
Single-Qubit Gates," in IEEE Transactions on Quantum Engineering, vol. quantum computing interface. In Future of Information and
4, pp. 1-16, 2023, Art no. 3101016, doi: 10.1109/TQE.2023.3286411. Communication Conference. Springer, Cham. 2019, (pp. 547-563)
[4] M. Mykhailova, "Developing Programming Assignments for Teaching [21] Beth, T. Quantum computing: an introduction. In 2020 IEEE
Quantum Computing and Quantum Programming," 2022 IEEE International Symposium on Circuits and Systems (ISCAS), 2020, (Vol.
International Conference on Quantum Computing and Engineering 1, pp. 735-736). IEEE. Retrieved from:
(QCE), Broomfield, CO, USA, 2022, pp. 688-692, doi: https://www.pcmag.com/news/5-reasons-to-play-quantum-break
10.1109/QCE53715.2022.00092. [accessed on, 15/7/2020]
[5] M. Gowrishankar, J. Wright, D. Claudino, T. Nguyen, A. McCaskey and
T. S. Humble, "Numerical Simulations of Noisy Variational Quantum
Eigensolver Ansatz Circuits," 2021 IEEE International Conference on
Quantum Computing and Engineering (QCE), Broomfield, CO, USA,
2021, pp. 155-159, doi: 10.1109/QCE52317.2021.00032.
[6] K. Sathyaseelan, T. Vyas, R. Madala, V. Chamundeeswari, H. Rai Goyal
and R. Jayaraman, "Blockchain Enabled Intelligent Surveillance System
Model with AI and IoT," 2023 Eighth International Conference on
Science Technology Engineering and Mathematics (ICONSTEM),
Chennai, India, 2023, pp. 1-7, doi:
10.1109/ICONSTEM56934.2023.10142303
[7] S. Hari Krishna, R. Madala, P. Ramya, A. Sabarirajan, D. Dobhal and S.
Sapate, "Ethically Governed Artificial Intelligence Based Innovative
Business Research in Finance and Marketing System," 2023 Eighth
International Conference on Science Technology Engineering and
Mathematics (ICONSTEM), Chennai, India, 2023, pp. 1-7,
doi:10.1109/ICONSTEM56934.2023.10142352
[8] R. Madala, R. Monica, S. S. Malwade, S. S, S. J. Budhavale and N.
Sathyabalaji, "A Novel Dynamic Watermarking for Secure Data
Protection from Cyber Theft Based on Artificial Intelligence
Supervision," 2023 Eighth International Conference on Science
Technology Engineering and Mathematics (ICONSTEM), Chennai, India,
2023, pp. 1-7, doi:10.1109/ICONSTEM56934.2023.10142898
[9] N. Yathiraju, P. Raman, R. Madala, P. Surgonda Patil, A. Kumar and S.
Ashwin, "Research and Innovation to Market Development: Artificial
Intelligence in Business," 2023 Eighth International Conference on
Science Technology Engineering and Mathematics (ICONSTEM),
Chennai, India, 2023, pp. 1-6, doi:
10.1109/ICONSTEM56934.2023.10142715
[10] McCaskey, A. J., Lyakh, D. I., Dumitrescu, E. F., Powers, S. S., &
Humble, T. S. XACC: a system-level software infrastructure for
heterogeneous quantum–classical computing. Quantum Science and
Technology, 2020, 5(2), 024002.
[11] Razmi, H., Baramzadeh, N., &Baramzadeh, H. Dispersive property of
the quantum vacuum and the speed of light. Modern Physics Letters A,
2019, 34(04), 1950035.
[12] Weinberg, S. The trouble with quantum mechanics. The New York
Review of Books, 2017, 64(1), 51-53.
[13] Mohseni, M., Read, P., Neven, H., Boixo, S., Denchev, V., Babbush, R.,
& Martinis, J. Commercialize quantum technologies in five years.
Nature, 2017, 543(7644), 171- 174.
821
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.