Quantum Information Technologies in Cybersecurity: Developing Unbreakable Encryption for Continuous Integration Environments

Authors

  • Yeshwanth Vasa Independent Researcher

DOI:

https://doi.org/10.36676/jrps.v12.i2.1539

Keywords:

Quantum cryptography, Continuous Integration, QKD, cybersecurity, encryption

Abstract

Due to the evolving nature of cyber threats, adequate protection of CI environments, a crucial component of the modern DevOps pipeline, remains an essential problem. Quantum cryptography, based on the principles of quantum mechanics, seems to provide a solution to improve the security of data transmissions in these contexts. This paper analyses QKD's suitability for establishing secure communication protocols in CI systems. By illustrating simulation reports and real-life examples, this paper shows how quantum cryptographic approaches can help avoid threats related to traditional encryption algorithms. Leveraging quantum-safe cryptographic solutions to fill the existing security loopholes is a solution to modern cyber threats. However, problems like implementation costs, technological barriers, and performance decline as the number of users increases are other barriers that need to be addressed to see the full potential of quantum cryptography in CI environments. The paper ends with tactical conclusions regarding creating secure CI settings with QE to further examine and implement in cybersecurity.

References

Inglesant, P., Jirotka, M., & Hartswood, M. (2018). Responsible innovation in quantum technologies applied to defense and national security. NQIT (Networked Quantum Information Technologies). https://nqit.ox.ac.uk/sites/www.nqit.ox.ac.uk/files/2018-11/Responsible%20Innovation%20in%20Quantum%20Technologies%20applied%20to%20Defence%20and%20National%20Security%20PDFNov18.pdf

Taylor, R. D. Quantum Technology Development, Policy and Governance in the US. https://www.researchgate.net/profile/Richard-Taylor-33/publication/356613273_Quantum_Technology_Development_Policy_and_Governance_in_the_US/links/61a4f6bb8c253c45f695ef5d/Quantum-Technology-Development-Policy-and-Governance-in-the-US.pdf

Inglesant, P., Hartswood, M., & Jirotka, M. (2016). Thinking ahead to a world with quantum computers: the landscape of responsible research and innovation in quantum computing. https://ora.ox.ac.uk/objects/uuid:78774511-e1d4-4e44-b4bc-52e58fcb6fc3/download_file?file_format=&hyrax_fileset_id=sf1881m651&safe_filename=Inglesant_et_al_2016_thinking_ahead_to.pdf&type_of_work=Report

Buchanan, W., & Woodward, A. (2017). Will quantum computers be the end of public key encryption? Journal of Cyber Security Technology, 1(1), 1-22. https://scholar.google.com/scholar?output=instlink&q=info:6MTMShZ35YgJ:scholar.google.com/&hl=en&as_sdt=0,5&as_ylo=2014&as_yhi=2019&scillfp=8073817092764376699&oi=lle DOI: https://doi.org/10.1080/23742917.2016.1226650

Cadzow, S., Sanchez, I., & Baldini, G. (2018). An analysis of the development and application of cybersecurity standards. Joint Res. Centre, Petten, The Netherlands, Tech. Rep. JRC110858. https://publications.jrc.ec.europa.eu/repository/bitstream/JRC110858/an_analysis_on_the_development_and_application_of_cybersecurity_standards_pubids.pdf

Brennan, D. (2018). Quantum computational supremacy: Security and vulnerability in a new paradigm. Irish Communication Review, 16(1), 10. https://arrow.tudublin.ie/cgi/viewcontent.cgi?article=1161&context=icr

Tujner, Z. (2019). Quantum-safe TOR, post-quantum cryptography (Master's thesis, University of Twente). http://essay.utwente.nl/79710/1/tujner_MA_eemcs.pdf

Chithralekha, B., Kalpana, S., Ganeshvani, G., & Muttukrishnan, R. (2017). Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions. Signature, 44. https://www.academia.edu/download/79249596/pdf.pdf

Saleem, F. (2019). A Novel Multiple Access Quantum Key Distribution Network for Secure Communication. An Investigation into The Use of Laws of Quantum Physics And Communication Protocols To Enable Multiple Clients To Exchange Quantum Keys In A LAN environment For Secure Communication. https://bradscholars.brad.ac.uk/bitstream/handle/10454/19250/'09031584%20F%20Saleem%20-%20Final%20Thesis.pdf?sequence=1

Vasa, Y. (2021). Develop Explainable AI (XAI) Solutions For Data Engineers. NVEO - Natural Volatiles & Essential Oils, 8(3), 425–432. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5769 DOI: https://doi.org/10.53555/nveo.v8i3.5769

Singirikonda, P., Jaini, S., & Vasa, Y. (2021). Develop Solutions To Detect And Mitigate Data Quality Issues In ML Models. NVEO - Natural Volatiles & Essential Oils, 8(4), 16968–16973. https://doi.org/https://doi.org/10.53555/nveo.v8i4.5771 DOI: https://doi.org/10.53555/nveo.v8i4.5771

Vasa, Y., Jaini, S., & Singirikonda, P. (2021). Design Scalable Data Pipelines For Ai Applications. NVEO - Natural Volatiles & Essential Oils, 8(1), 215–221. https://doi.org/https://doi.org/10.53555/nveo.v8i1.5772 DOI: https://doi.org/10.53555/nveo.v8i1.5772

Nunnaguppala, L. S. C. , Sayyaparaju, K. K., & Padamati, J. R.. (2021). "Securing The Cloud: Automating Threat Detection with SIEM, Artificial Intelligence & Machine Learning", International Journal For Advanced Research In Science & Technology, Vol 11 No 3, 385-392

Sukender Reddy Mallreddy(2020).Cloud Data Security: Identifying Challenges and Implementing Solutions.JournalforEducators,TeachersandTrainers,Vol.11(1).96 -102.

Jangampeta, S., Mallreddy, S. R., & Padamati, J. R. (2021). Data Security: Safeguarding the Digital Lifeline in an Era of Growing Threats. International Journal for Innovative Engineering and Management Research, 10(4), 630-632.

Downloads

Published

30-05-2021

How to Cite

Yeshwanth Vasa. (2021). Quantum Information Technologies in Cybersecurity: Developing Unbreakable Encryption for Continuous Integration Environments. International Journal for Research Publication and Seminar, 12(2), 169–176. https://doi.org/10.36676/jrps.v12.i2.1539