Quantum Information Technologies in Cybersecurity: Developing Unbreakable Encryption for Continuous Integration Environments
DOI:
https://doi.org/10.36676/jrps.v12.i2.1539Keywords:
Quantum cryptography, Continuous Integration, QKD, cybersecurity, encryptionAbstract
Due to the evolving nature of cyber threats, adequate protection of CI environments, a crucial component of the modern DevOps pipeline, remains an essential problem. Quantum cryptography, based on the principles of quantum mechanics, seems to provide a solution to improve the security of data transmissions in these contexts. This paper analyses QKD's suitability for establishing secure communication protocols in CI systems. By illustrating simulation reports and real-life examples, this paper shows how quantum cryptographic approaches can help avoid threats related to traditional encryption algorithms. Leveraging quantum-safe cryptographic solutions to fill the existing security loopholes is a solution to modern cyber threats. However, problems like implementation costs, technological barriers, and performance decline as the number of users increases are other barriers that need to be addressed to see the full potential of quantum cryptography in CI environments. The paper ends with tactical conclusions regarding creating secure CI settings with QE to further examine and implement in cybersecurity.
References
Inglesant, P., Jirotka, M., & Hartswood, M. (2018). Responsible innovation in quantum technologies applied to defense and national security. NQIT (Networked Quantum Information Technologies). https://nqit.ox.ac.uk/sites/www.nqit.ox.ac.uk/files/2018-11/Responsible%20Innovation%20in%20Quantum%20Technologies%20applied%20to%20Defence%20and%20National%20Security%20PDFNov18.pdf
Taylor, R. D. Quantum Technology Development, Policy and Governance in the US. https://www.researchgate.net/profile/Richard-Taylor-33/publication/356613273_Quantum_Technology_Development_Policy_and_Governance_in_the_US/links/61a4f6bb8c253c45f695ef5d/Quantum-Technology-Development-Policy-and-Governance-in-the-US.pdf
Inglesant, P., Hartswood, M., & Jirotka, M. (2016). Thinking ahead to a world with quantum computers: the landscape of responsible research and innovation in quantum computing. https://ora.ox.ac.uk/objects/uuid:78774511-e1d4-4e44-b4bc-52e58fcb6fc3/download_file?file_format=&hyrax_fileset_id=sf1881m651&safe_filename=Inglesant_et_al_2016_thinking_ahead_to.pdf&type_of_work=Report
Buchanan, W., & Woodward, A. (2017). Will quantum computers be the end of public key encryption? Journal of Cyber Security Technology, 1(1), 1-22. https://scholar.google.com/scholar?output=instlink&q=info:6MTMShZ35YgJ:scholar.google.com/&hl=en&as_sdt=0,5&as_ylo=2014&as_yhi=2019&scillfp=8073817092764376699&oi=lle DOI: https://doi.org/10.1080/23742917.2016.1226650
Cadzow, S., Sanchez, I., & Baldini, G. (2018). An analysis of the development and application of cybersecurity standards. Joint Res. Centre, Petten, The Netherlands, Tech. Rep. JRC110858. https://publications.jrc.ec.europa.eu/repository/bitstream/JRC110858/an_analysis_on_the_development_and_application_of_cybersecurity_standards_pubids.pdf
Brennan, D. (2018). Quantum computational supremacy: Security and vulnerability in a new paradigm. Irish Communication Review, 16(1), 10. https://arrow.tudublin.ie/cgi/viewcontent.cgi?article=1161&context=icr
Tujner, Z. (2019). Quantum-safe TOR, post-quantum cryptography (Master's thesis, University of Twente). http://essay.utwente.nl/79710/1/tujner_MA_eemcs.pdf
Chithralekha, B., Kalpana, S., Ganeshvani, G., & Muttukrishnan, R. (2017). Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions. Signature, 44. https://www.academia.edu/download/79249596/pdf.pdf
Saleem, F. (2019). A Novel Multiple Access Quantum Key Distribution Network for Secure Communication. An Investigation into The Use of Laws of Quantum Physics And Communication Protocols To Enable Multiple Clients To Exchange Quantum Keys In A LAN environment For Secure Communication. https://bradscholars.brad.ac.uk/bitstream/handle/10454/19250/'09031584%20F%20Saleem%20-%20Final%20Thesis.pdf?sequence=1
Vasa, Y. (2021). Develop Explainable AI (XAI) Solutions For Data Engineers. NVEO - Natural Volatiles & Essential Oils, 8(3), 425–432. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5769 DOI: https://doi.org/10.53555/nveo.v8i3.5769
Singirikonda, P., Jaini, S., & Vasa, Y. (2021). Develop Solutions To Detect And Mitigate Data Quality Issues In ML Models. NVEO - Natural Volatiles & Essential Oils, 8(4), 16968–16973. https://doi.org/https://doi.org/10.53555/nveo.v8i4.5771 DOI: https://doi.org/10.53555/nveo.v8i4.5771
Vasa, Y., Jaini, S., & Singirikonda, P. (2021). Design Scalable Data Pipelines For Ai Applications. NVEO - Natural Volatiles & Essential Oils, 8(1), 215–221. https://doi.org/https://doi.org/10.53555/nveo.v8i1.5772 DOI: https://doi.org/10.53555/nveo.v8i1.5772
Nunnaguppala, L. S. C. , Sayyaparaju, K. K., & Padamati, J. R.. (2021). "Securing The Cloud: Automating Threat Detection with SIEM, Artificial Intelligence & Machine Learning", International Journal For Advanced Research In Science & Technology, Vol 11 No 3, 385-392
Sukender Reddy Mallreddy(2020).Cloud Data Security: Identifying Challenges and Implementing Solutions.JournalforEducators,TeachersandTrainers,Vol.11(1).96 -102.
Jangampeta, S., Mallreddy, S. R., & Padamati, J. R. (2021). Data Security: Safeguarding the Digital Lifeline in an Era of Growing Threats. International Journal for Innovative Engineering and Management Research, 10(4), 630-632.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.