0% found this document useful (0 votes)
14 views5 pages

Evolution and Advancement of Quantum Computing in The Era of Networking and Cryptography

The document discusses the evolution and advancements in quantum computing, highlighting its principles, historical development, and applications in networking and cryptography. It emphasizes the potential of quantum computing to enhance computational speed and security, while also addressing ongoing research and unresolved issues in the field. The paper is structured into sections covering quantum mechanics, networking, cryptography, and future prospects of quantum technology.

Uploaded by

gcnanditha4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views5 pages

Evolution and Advancement of Quantum Computing in The Era of Networking and Cryptography

The document discusses the evolution and advancements in quantum computing, highlighting its principles, historical development, and applications in networking and cryptography. It emphasizes the potential of quantum computing to enhance computational speed and security, while also addressing ongoing research and unresolved issues in the field. The paper is structured into sections covering quantum mechanics, networking, cryptography, and future prospects of quantum technology.

Uploaded by

gcnanditha4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

2023 International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT)

Evolution and Advancement of Quantum Computing


2023 International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT) | 979-8-3503-4438-7/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICAICCIT60255.2023.10465946

in the Era of Networking and Cryptography


Javed Moazzam Rahul Pawar Mayank Deep Khare
Department of Computer Science Department of Computer Science and Department of Internet of Things,
and Engineering, Information Technology, Noida Institute of Engineering and
Tula's Institute, Dehradun, India Jain (Deemed to be University), Technology,
[email protected] Bangalore, India Greater Noida, Uttar Pradesh, India
rahul.pawar@jainuniversity. [email protected]
ac.in

Abstract— Over the past decade, we've witnessed a remarkable capabilities, surpassing even the most powerful abacuses and
and rapid surge in the realm of high-performance computing. supercomputers [2].
The entire computing landscape, encompassing cloud and fog
computing, has seen an unprecedented surge in popularity. The development of a functional quantum computer hinges
Cloud computing, a system interconnecting myriad components,
delivers application, data, and storage services over the internet.
on maintaining a "quantum state in superposition" for a
Quantum computing, on the other hand, harnesses the sufficient duration to perform multiple operations.
remarkable phenomena of quantum mechanics like Superposition, when it interacts with a measuring system
superposition and entanglement for computational purposes. component, undergoes decoherence and shifts to a classical
This paper serves as an expansive introduction to the bit, losing its intermediate state. Quantum computing devices
fundamental principles, historical evolution, and breakthroughs aim to preserve quantum states against decoherence while
in quantum computing, shedding light on its applications in ensuring read accessibility. Diverse strategies are being
network technology and cryptography. Moreover, it delves into explored, including more robust quantum processes and
the exciting potential for future game development empowered improved error detection methods [3]. Quantum computing is
by quantum technology. In particular, we'll uncover the latest
strides in cognitive networking and cryptography, drawing
currently in the developmental phase, with researchers
attention to the cutting-edge developments. Finally, we'll worldwide dedicated to devising models for computing
scrutinize the on-going research endeavours and lingering hardware, architectures, and software that will make
questions demanding further exploration within the dynamic computing accessible to end-users. This study delves into the
realm of quantum computing. historical evolution of quantum computing, its core principles,
recent advancements in quantum networks and cryptography.
Keywords— Quantum Computing, Network, Cryptography, high Our goal is to investigate unresolved issues in quantum
performance computing and fog computing computing that have yet to be thoroughly examined or
researched[4].
The study is structured into six main sections. The initial
I. INTRODUCTION segment discusses the quantum. Section 2 deals with quantum
mechanics. Section 3 deals with quantum networking and
The exponential growth of high-performance computing section 4 deals with quantum cryptography respectively. The
has its roots in cluster computing and has evolved with the paper concludes in Section 5, outlining the future of quantum
emergence of grid, cloud, and fog computing. Today, computing.
significant research efforts are underway in the domain of
quantum computing. The main goal of this study is to advance II. QUANTUM MECHANISM
the computing process, enhance the speed of intermediate
networks, and bolster security measures. Researchers believe Quantum computers are engineered based on the principles
that quantum physics theory will be instrumental in of quantum theory, a branch of physics, and are often hailed as
developing advanced computing paradigms that deliver high- the computers of the future. Traditional computers, such as
quality services to end-users, ensuring reliability and desktops, laptops, tablets, and smartphones, are predominantly
security[1].
binary computers, operating on binary functions using ones
Quantum computing is a realm of research dedicated to the
creation of computer technology based on the principles of and zeros (1, 0). These devices employ transistors within their
quantum theory, which elucidates the behavior of energy and processors, which can exist in either an activated or
matter at the nuclear and subatomic level. If quantum deactivated state, representing the binary choices of on (1) or
computing becomes viable, it will revolutionize computing off (0). The ensuing stages of computation are exclusively
discernible to these binary digits (1, 0). Computer programs

979-8-3503-4438-7/23/$31.00 ©2023 IEEE

817
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
harness the remarkable capacity to create complex software using entangled quantum particles, exemplifying a
using a limited set of basic statements like "if," "this," "then," phenomenon. In such a quantum network, distinct particles,
"that," and "scenario," often expressed in the language of even when separated by vast distances, can exist in a unique
binary numbers, or bits[5]. state enabling instantaneous information transfer between
Quantum computers, on the other hand, employ qubits them.
(quantum bits) rather than traditional bits. Qubits exhibit an
additional capability absent in classical bits. While classical
computing relies on binary digits (0 or 1), quantum computing
introduces a paradigm shift. In quantum computing, a system
can exist in any state, encompassing both zero and one
simultaneously [6]. This distinctive feature enables developers
to utilize both conditions concurrently when crafting logical
operations, potentially leading to expedited computation
speeds. Quantum computers employ qubits to replicate the
behaviour of surrounding particles, resulting in significantly Fig. 1 Hacker tampering communication in quantum networks[8]
enhanced computational speed and capability compared to
binary computers. One of the distinguishing features of quantum networking
is its robust resistance to hacking attempts, ensuring data
security. When qubits are employed to transmit confidential
A. Binary Computing vs. Quantum Computing messages, any interference by hackers is swiftly detected by
both the sender and the recipient, offering a reassuring layer
In the realm of binary computing, operations are of security as shown in Fig. 1.
systematically conducted one by one, allowing for the The quantum networks of the future must also contend
possibility of obtaining multiple results simultaneously. with queuing delays using quantum queuing delay (QQD) [9]
Quantum computing, however, redefines the operational model for the analysis of data queuing delays, leveraging
mechanism [7]. dynamic programming to quantify limited storage space. The
The key distinction is that while a binary computer model facilitates the formulation of a policy based on
actively computes and verifies outcomes, a quantum computer cognitive memory, ultimately minimizing queuing delays,
seemingly anticipates results in advance. For instance, providing superior performance in policy implementation .
Google's quantum computer has showcased significantly Furthermore, quantum networks hold immense potential
accelerated computational speeds compared to conventional for secure data transmission across a spectrum of applications,
binary computers. However, the practical use of quantum including government institutions, universities, hospitals,
computers in residential settings is currently limited due to schools, offices, airports, and even elections, promising
their requirement of operating at frigid temperatures ranging efficient and secure voting processes with minimal risk of
from 0 to -5 Celsius. Temperatures exceeding this threshold tampering[10].
may render a quantum computer inoperable.
• Untangled Network
III. QUANTUM NETWORKING
The concept of an "untangled network" plays a pivotal
Quantum networks are redefining the boundaries of role in the domain of quantum key distribution, preserving the
modern communication and computation, presenting both confidentiality of sensitive data on classical networks for
extended durations. Although its coverage is limited, even
challenges and extraordinary prospects at the forefront of
satellite-based deployment remains a viable option. While it
intellectual and technical innovation, encompassing quantum may not shine in complex multi-hop scenarios, this network
processing and communication. These networks, with a architecture excels in point-to-point settings.
multitude of channels and nodes, necessitate novel
methodologies to create and assess quantum coherence and • Entangled Network
entanglement, giving rise to a sense of fascination and
excitement in those delving into the realm of quantum On the flip side, the entangled network opens doors to a
technologies[8]. multitude of operations by enabling the generation of secret
random numbers while preserving data privacy. However, it
Quantum networking, in its simplest terms, replaces doesn't provide the capability for long-distance message
conventional radio waves with quantum flags for data transmission through quantum repeaters or robust network
transmission. This innovative approach opens doors to the infrastructure. Quantum networking hinges on the unique
seamless exchange of information across a global network

818
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
nature of qubits, which defy replication in contrast to classical cryptography ensures that the data is highly secure, unlike
bits. mathematical encryption.
IV. QUANTUM CRYPTOGRAPHY
Quantum Cryptography employs photons to transport data
Quantum cryptography refers to the understanding of between servers, enabling both sides to ascertain the security
creating quantum-based assets for various cryptographic of the key. Initially, a server transmits photons through a filter
purposes. It is currently not possible to create near-identical that is marked with certain bit designations. Subsequently, the
copies of encrypted data stored in a quantum state. Quantum photons proceed towards the recipient, who is responsible for
Cryptography utilizes the concepts of quantum physics to arranging the polarizers. Subsequently, the second server
encrypt data through key distribution and the use of photons. transmits the data back to the initial server, providing them
Quantum encryption enables two servers to connect with the precise sequence of the polarizers. This information
securely without being detected by eavesdroppers who then transforms into a key within the obtained findings.
possess unbounded computational capabilities. Quantum
A. OpenFlow Protocol in Quantum Cryptography
TABLE I
FINDINGS ON QUANTUM CRYPTOGRAPHY

Reference Topic Findings

- Quantum encryption is the concept of creating cryptographic assets that are


nearly impossible to replicate
[12] Quantum Encryption - Any unauthorized attempts to decipher quantum-encrypted data result in
alterations to its fundamental condition.
- The field of Quantum Cryptography was pioneered by Stephen Wiesner
and Gilles Brassard.
- Quantum Cryptography leverages quantum physics principles for data
[13] Quantum Cryptography encryption using photons and key distribution.
- It ensures secure connections between servers while evading detection by
eavesdroppers with unlimited computational capabilities.
- Quantum Cryptography relies on photons for secure key exchange.
Photon-Based Key - Servers transmit photons labeled with specific bit designations and use
[14] polarizer configurations to generate encryption keys
Exchange
- If photons are illicitly copied, their state undergoes changes.
- Vladimir et al. propose using the OpenFlow protocol in SDN for secure
communication and routing within quantum networks.
OpenFlow Protocol in - This entails dynamic switching between classic and quantum data
[15]
Quantum Networking encryption, allowing flexible Quality of Service (QoS) setup.
- It advances quantum cryptography in terms of service delivery and its shift
toward industrial-scale application.
Mobile-Adapted - The Dynamic MLP presents an innovative approach to voice recognition,
[16] Automated Speech capable of processing variable-length output from VAD without altering
Recognition input length
- HMM achieves superior recognition performance but requires significantly
more time for computation compared to Dynamic MLP.
- Dynamic MLP's computation time is 8935.4% faster than HMM for the
same test data.
HMM vs. Dynamic - HMM's computational time escalates exponentially when dealing with
[17]
MLP additional target data sets, owing to the need for separate HMMs for each
word.
- In contrast, neural networks may exhibit a more modest increase in
computation time as the network size grows, but further research is needed
to confirm this assertion.

This enables the establishment of virtual encoding automated speech recognition methodologies namely dynamic
channels that may be configured to provide the required perceptron and vocal activity detection.
degree of QoS for security purposes. This research will B. Applications of Quantum Cryptography
facilitate the advancement of quantum cryptography in terms • Photons are transmitted between apartments using a
of service provision and aid in its transition to an industrial fiber connection and two beam splitters to convey the
scale [11]. This protocol introduces two mobile-adapted polarity of each individual photon.

819
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
• They are not verifiable and lack user-friendliness or compelling hackers to breach multiple pathways
convenience. simultaneously [16, 17].
• It requires fewer resources for maintenance.
• The technology ensures the protection of confidential F. Benefits of Quantum Cryptography
information and prevents unauthorized access to The advantages of Quantum Cryptography as shown in figure
important credentials. 2. are manifold:
• Encryption produces ciphertext that is the same
length as the plaintext, making it suitable for use as a • It draws its strength from the principles of physics,
one-time pad. The security of the cryptographic offering unparalleled security for the transmission of
algorithm is impregnable. confidential information comspared to mathematical
encryption.
C. Limitations Quantum cryptography • Quantum physics renders it virtually impervious to
The understanding of quantum phenomena is incomplete hacking attempts [18].
and not fully comprehended in all instances. The • It's a resource-efficient solution, demanding minimal
transmission of huge documents is challenging due to the fact resources.
that the size of the solutions is greater than that of symmetric
• Quantum data has an innate ability to self-modify
cryptographic systems.
when subjected to eavesdropping attempts.
D. Quantum Cryptography Types
1) Symmetric Key Cryptography: Symmetric Key

Advantages of Quantum Cryptography


Cryptography [12] employs a solitary key for both encrypting
Utilizes the laws of physics for
and decrypting data. Over the past decade, this encryption enhanced security in data
method has been steadfastly embraced by organizations and communication and transfer.
militaries. Currently, block and stream ciphers stand as the
two predominant techniques in symmetric cryptography. Virtually impervious to
2) Asymmetric Key Cryptography: Conversely, asymmetric hacking due to its basis in
key cryptography [13] commonly referred to as public-key quantum physics.
cryptography, relies on two distinct keys for encryption and
decryption of data. These keys are the public key, which Requires minimal resources
serves the purpose of sharing data with the world, and the for maintenance.
private key to keep sensitive information confidential. One
key is deployed for encryption, while the other takes up the
Self-modifies data when
mantle of decryption. Notably, RSA (Rivest-Shamir-Adleman) subjected to eavesdropping
represents the most prevalent form of asymmetric attempts for added security.
cryptography and finds its application across numerous
protocols.
Fig. 2 Pros of Quantum Cryptography [18]
E. Quantum Key Distribution (QKD)
V. CONCLUSION AND FUTURE SCOPE
Within the intricate world of quantum cryptography, Quantum
This paper provides an analysis of state-of-the-art quantum
Key Distribution (QKD) emerges as a fundamental player,
computing in various domains, including quantum mechanics,
enabling the confidential transmission of secret keys across
varying locations. networks, cryptography, and gaming. We provide fundamental
Quantum Key Distribution [14] revolutionizes the principles and foundational knowledge [18-21] of quantum
establishment of a confidential encryption key. Transmitting computing, as well as discuss recent advancements in
this key securely between two individuals is a key tenet of "networks, and cryptography". In conclusion, we have
QKD. With QKD, data is exclusively accessible to the thoroughly examined the unresolved matters and potential
intended recipient and immune to the prying eyes of avenues for further investigation in the realm of Quantum
unauthorized individuals [15]. Computing. Conclusively, commercial entities possessing
Despite a high degree of maturity in QKD systems, the sensitive information have a vested interest in safeguarding
challenge of transmitting quantum photon signals across their data, thereby attracting potential eavesdroppers who
extensive distances persists, resulting in signal loss in anticipate that quantum cryptography will offer a high level of
intermediary devices and communication channels. The security. Quantum cryptography appears to be a more
introduction of intermediate repeaters (nodes) presents an
favourable and widely implemented solution for data security.
innovative solution, enhancing network security by

820
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.
As a future scope, the concept of quantum computing can [14] Sandberg, M., Brink, M., Adiga, V., Chavez-Garcia, J., Chow, J., Paik,
H., & Orcutt, J. Low temperature measurement of SiGe properties for
be integrated with designing of power systems for 6G wireless
superconducting quantum circuits. APS, 2019, X29-007.
networks. [15] Wehner, S., Elkouss, D., & Hanson, R. Quantum internet: A vision for
the road ahead. Science, 2018, 362(6412).
REFERENCES [16] Dai, W., Peng, T., & Win, M. Z. Quantum queuing delay. IEEE Journal
[1] M. Alghadeer, E. Aldawsari, R. Selvarajan, K. Alutaibi, S. Kais and F. H. on Selected Areas in Communications, 2020, 38(3), 605-618.
Alharbi, "Psitrum and Universal Simulation of Quantum Computers," [17] Guo, X., Breum, C. R., Borregaard, J., Izumi, S., Larsen, M. V.,
2022 IEEE International Conference on Quantum Computing and Gehring, T., ... & Andersen, U. L. Distributed quantum sensing in a
Engineering (QCE), Broomfield, CO, USA, 2022, pp. 837-838, doi: continuous-variable entangled network. Nature Physics, 2020, 16(3),
10.1109/QCE53715.2022.00137. 281-284.
[2] S. Lokes, C. S. J. Mahenthar, S. P. Kumaran, P. Sathyaprakash and V. [18] Donetti, L., Hurtado, P. I., & Munoz, M. A. Entangled networks,
Jayakumar, "Implementation of Quantum Deep Reinforcement Learning synchronization, and optimal network topology. Physical Review
Using Variational Quantum Circuits," 2022 International Conference on Letters, 2005, 95(18), 188701.
Trends in Quantum Computing and Emerging Business Technologies [19] Wilkinson, K. N., Cope, T. P., &Pirandola, S. Exploring the Limitations
(TQCEBT), Pune, India, 2022, pp. 1-4, doi: of Quantum Networking through Butterfly‐Based Networks. Advanced
10.1109/TQCEBT54229.2022.10041479. Quantum Technologies, 2020, 3(3), 1900103.
[3] H. C. Watanabe, R. Raymond, Y. -Y. Ohnishi, E. Kaminishi and M. [20] Barabasi, S., Barrera, J., Bhalani, P., Dalvi, P., Dimiecik, R., Leider, A.,
Sugawara, "Optimizing Parameterized Quantum Circuits with Free-Axis ... & Tappert, C. C. Student user experience with the IBM Qiskit
Single-Qubit Gates," in IEEE Transactions on Quantum Engineering, vol. quantum computing interface. In Future of Information and
4, pp. 1-16, 2023, Art no. 3101016, doi: 10.1109/TQE.2023.3286411. Communication Conference. Springer, Cham. 2019, (pp. 547-563)
[4] M. Mykhailova, "Developing Programming Assignments for Teaching [21] Beth, T. Quantum computing: an introduction. In 2020 IEEE
Quantum Computing and Quantum Programming," 2022 IEEE International Symposium on Circuits and Systems (ISCAS), 2020, (Vol.
International Conference on Quantum Computing and Engineering 1, pp. 735-736). IEEE. Retrieved from:
(QCE), Broomfield, CO, USA, 2022, pp. 688-692, doi: https://www.pcmag.com/news/5-reasons-to-play-quantum-break
10.1109/QCE53715.2022.00092. [accessed on, 15/7/2020]
[5] M. Gowrishankar, J. Wright, D. Claudino, T. Nguyen, A. McCaskey and
T. S. Humble, "Numerical Simulations of Noisy Variational Quantum
Eigensolver Ansatz Circuits," 2021 IEEE International Conference on
Quantum Computing and Engineering (QCE), Broomfield, CO, USA,
2021, pp. 155-159, doi: 10.1109/QCE52317.2021.00032.
[6] K. Sathyaseelan, T. Vyas, R. Madala, V. Chamundeeswari, H. Rai Goyal
and R. Jayaraman, "Blockchain Enabled Intelligent Surveillance System
Model with AI and IoT," 2023 Eighth International Conference on
Science Technology Engineering and Mathematics (ICONSTEM),
Chennai, India, 2023, pp. 1-7, doi:
10.1109/ICONSTEM56934.2023.10142303
[7] S. Hari Krishna, R. Madala, P. Ramya, A. Sabarirajan, D. Dobhal and S.
Sapate, "Ethically Governed Artificial Intelligence Based Innovative
Business Research in Finance and Marketing System," 2023 Eighth
International Conference on Science Technology Engineering and
Mathematics (ICONSTEM), Chennai, India, 2023, pp. 1-7,
doi:10.1109/ICONSTEM56934.2023.10142352
[8] R. Madala, R. Monica, S. S. Malwade, S. S, S. J. Budhavale and N.
Sathyabalaji, "A Novel Dynamic Watermarking for Secure Data
Protection from Cyber Theft Based on Artificial Intelligence
Supervision," 2023 Eighth International Conference on Science
Technology Engineering and Mathematics (ICONSTEM), Chennai, India,
2023, pp. 1-7, doi:10.1109/ICONSTEM56934.2023.10142898
[9] N. Yathiraju, P. Raman, R. Madala, P. Surgonda Patil, A. Kumar and S.
Ashwin, "Research and Innovation to Market Development: Artificial
Intelligence in Business," 2023 Eighth International Conference on
Science Technology Engineering and Mathematics (ICONSTEM),
Chennai, India, 2023, pp. 1-6, doi:
10.1109/ICONSTEM56934.2023.10142715
[10] McCaskey, A. J., Lyakh, D. I., Dumitrescu, E. F., Powers, S. S., &
Humble, T. S. XACC: a system-level software infrastructure for
heterogeneous quantum–classical computing. Quantum Science and
Technology, 2020, 5(2), 024002.
[11] Razmi, H., Baramzadeh, N., &Baramzadeh, H. Dispersive property of
the quantum vacuum and the speed of light. Modern Physics Letters A,
2019, 34(04), 1950035.
[12] Weinberg, S. The trouble with quantum mechanics. The New York
Review of Books, 2017, 64(1), 51-53.
[13] Mohseni, M., Read, P., Neven, H., Boixo, S., Denchev, V., Babbush, R.,
& Martinis, J. Commercialize quantum technologies in five years.
Nature, 2017, 543(7644), 171- 174.

821
Authorized licensed use limited to: VTU Consortium. Downloaded on April 03,2025 at 15:08:53 UTC from IEEE Xplore. Restrictions apply.

You might also like