Page 1 of 8
Advances in Social Sciences Research Journal – Vol. 11, No. 10
Publication Date: October 25, 2024
DOI:10.14738/assrj.1110.17764.
Hasan, M. (2024). Quantum Cryptography for Secure Communications and the Enhancement of U.S. Cybersecurity in the Quantum
Age. Advances in Social Sciences Research Journal, 11(10). 313-320.
Services for Science and Education – United Kingdom
Quantum Cryptography for Secure Communications and the
Enhancement of U.S. rCybersecurity in the Quantum Age
Mahmud Hasan
Department of Cybersecurity
ECPI University NV Newport News, VA, USA
ABSTRACT
This paper explores the critical role of quantum cryptography in enhancing U.S.
cybersecurity, focusing on its potential to counteract the growing threats posed by
quantum computing. As quantum computers advance, classical encryption methods
like RSA and AES face unprecedented vulnerabilities. Quantum Key Distribution
(QKD) offers a groundbreaking solution by leveraging quantum mechanics to
secure data transmission. The paper evaluates current implementations and future
challenges of quantum cryptography, emphasizing its importance for government,
military, financial, and healthcare sectors in safeguarding sensitive
communications in the quantum age.
Keywords: Quantum Cryptography, Quantum Key Distribution (QKD), Post-Quantum
Cryptography, Quantum Computing Threats, U.S. Cybersecurity, Quantum Infrastructure,
Secure Communications, NIST, Financial Data Protection, Military Communications,
Quantum Security.
INTRODUCTION
Background on Cybersecurity in the U.S.
Cybersecurity is a critical concern for various sectors in the U.S., including government,
military, healthcare, and finance, where secure communications are essential [6] [9]. Currently,
encryption standards like Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman
(RSA) help protect sensitive data [12]. However, the increasing sophistication of cyber threats,
such as state-sponsored attacks and data breaches, has exposed the limitations of these
encryption methods. The looming development of quantum computing poses a significant risk
to these standards, as quantum computers will eventually have the power to break classical
encryption, making it urgent to find new, robust encryption systems [1] [14].
Emerging Threat of Quantum Computing
Quantum computing represents a paradigm shift from classical computing. While classical
computers process data in binary (0s and 1s), quantum computers use quantum bits (qubits)
that can exist in multiple states simultaneously due to quantum superposition and
entanglement [4]. This unique capability enables quantum computers to perform complex
calculations exponentially faster than classical computers [16]. Shor's algorithm, for example,
can break the encryption algorithms that currently secure global communications, threatening
the foundations of digital security [15] [18]. The inevitability of such breakthroughs raises the
urgency to develop quantum-resistant encryption [10] [2].
Page 2 of 8
314
Advances in Social Sciences Research Journal (ASSRJ) Vol. 11, Issue 10, October-2024
Services for Science and Education – United Kingdom
Purpose of the Paper
This paper introduces quantum cryptography, focusing on Quantum Key Distribution (QKD), as
a viable solution to the cybersecurity risks presented by quantum computing [3]. QKD
leverages quantum mechanics to create secure communication channels that are theoretically
immune to quantum attacks [1] [5]. The goal is to assess the feasibility of QKD's large-scale
adoption across critical U.S. sectors and to explore its role in safeguarding communications
from future quantum-based threats [6] [17].
LITERATURE REVIEW
Quantum cryptography has gained significant attention due to its potential to protect
communications against the future threats of quantum computing. Researchers have focused
on developing technologies like Quantum Key Distribution (QKD) to secure communication
networks. The BB84 protocol, introduced in 1984, was one of the earliest and most widely
studied QKD implementations, demonstrating its ability to successfully resist eavesdropping
attempts [16] [3].
In 1994, Shor’s algorithm revealed the vulnerabilities of classical cryptographic methods, such
as RSA and ECC, to quantum computing [10]. Since then, research has increasingly focused on
finding quantum-resistant encryption methods. The National Institute of Standards and
Technology (NIST) has been a major player in these efforts, emphasizing the importance of
post-quantum cryptography (PQC) alongside QKD. In 2024, NIST announced its first
standardized PQC algorithms, such as CRYSTALS-Kyber, designed to defend against quantum
threats [6] [20].
Furthermore, JPMorgan Chase, in collaboration with Toshiba, has demonstrated the use of QKD
in securing financial transactions, reflecting the growing interest in quantum cryptography in
both public and private sectors [12] [18].
However, the literature also identifies several challenges in implementing QKD, including the
limitations of long-distance communication and the lack of quantum-compatible infrastructure
[15] [9]. Public-private partnerships are often proposed to address the financial and logistical
demands of building quantum-secure infrastructure [16] [5].
Timeline of Key Milestones in Quantum Cryptography Research
Year Event
1984 BB84 protocol for Quantum Key Distribution introduced [3]
1994 Shor’s algorithm developed, threatening classical cryptography [10]
2024 NIST announces first post-quantum cryptography standards [6]
Satellite-based QKD also shows promise for extending secure communications over long
distances, potentially overcoming the range limitations of fiber-optic QKD systems.
International collaborations are playing a pivotal role in driving advancements in quantum
cryptography research and its application [19] [22].
In summary, the literature highlights both the advancements and the challenges in quantum
cryptography. As quantum computing continues to advance, integrating quantum cryptography
Page 3 of 8
315
Hasan, M. (2024). Quantum Cryptography for Secure Communications and the Enhancement of U.S. Cybersecurity in the Quantum Age. Advances
in Social Sciences Research Journal, 11(10). 313-320.
URL: http://dx.doi.org/10.14738/assrj.1110.17764
into U.S. cybersecurity frameworks is crucial to maintaining national security and global
leadership in cybersecurity [15] [20].
QUANTUM COMPUTING AND THE ENCRYPTION CHALLENGE
Classical vs. Quantum Computing
Quantum computing operates fundamentally differently from classical computing. While
classical computers process data using bits that represent 0s or 1s, quantum computers use
quantum bits, or qubits, which exploit the principles of superposition and entanglement [3]
[16]. Superposition allows qubits to exist in multiple states simultaneously, and entanglement
links qubits so that the state of one can instantly affect another, regardless of distance. These
properties enable quantum computers to perform multiple calculations at once, giving them
immense computational power compared to classical machines [4] [19].
Impact of Quantum Computing on Classical Encryption
One of the most significant threats posed by quantum computing is its ability to break widely- used encryption methods. Shor’s algorithm, developed in 1994, can factor large numbers
exponentially faster than classical algorithms [10] [19]. This capability poses a direct threat to
encryption systems like RSA and elliptic curve cryptography (ECC), which rely on the difficulty
of factoring large prime numbers or solving discrete logarithms [1] [20]. With a fully functional
quantum computer, these encryption methods could be broken in hours or even minutes,
jeopardizing secure communications [12] [18].
Timeline of Key Milestones in Quantum Cryptography Research
Criteria Classical Cryptography (RSA, AES) Quantum Cryptography (QKD, PQC)
Security Vulnerable to quantum attacks
(e.g., Shor’s algorithm) [12] [15]
Resistant to quantum computing attacks
(QKD detects eavesdropping) [3] [1]
Computational
Power
Efficient for classical computers
[10]
Requires quantum infrastructure; high
computational power [16]
Scalability Already in use globally [17] High cost and technical complexity limit
scalability [16] [18]
Vulnerability
to Quantum
High vulnerability; can be broken
by quantum algorithms [9]
Low vulnerability; designed to be
quantum-safe [16] [12]
Vulnerable U.S. Sectors:
Several key U.S. sectors are especially vulnerable to the threats posed by quantum computing.
These include:
• Military communications: Quantum computers could break the encryption used in
military data transmission, compromising national security. The U.S. military relies on
advanced encryption systems, which could be vulnerable to quantum attacks [15] [18].
• Financial systems: The financial industry uses encryption to secure trillions of dollars in
transactions, making it a significant target for quantum-powered attacks. A breach of
financial encryption could disrupt the global economy and lead to major financial losses
[16] [18].
• Healthcare data: The digitization of health records increases the risk of quantum
cyberattacks that could expose sensitive medical information [16] [17].