Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

Extensive review of quantum computing and network security

Breadcrumb

  • Home
  • Extensive review of quantum computing and network security

Isaiah Awende Otieno *

Jaramogi Oginga Odinga University of Science and Technology, 40601, Bondo, Kenya.

Review Article
 
World Journal of Advanced Engineering Technology and Sciences, 2024, 12(02), 770–807.
Article DOI: 10.30574/wjaets.2024.12.2.0337
DOI url: https://doi.org/10.30574/wjaets.2024.12.2.0337

Received on 05 July 2024; revised on 12 August 2024; accepted on 15 August 2024

This research addresses the critical challenge of maintaining network security and privacy in the face of emerging quantum computing technologies. While classical cryptographic methods have long been the cornerstone of network security, the advent of quantum computing threatens to render many of these techniques obsolete. While previously proposed solutions, such as post-quantum cryptography and quantum key distribution, are useful in some aspects of maintaining the security of communications between individuals or organizations, they are often insufficient to protect against the full range of security implications that arise from quantum computing, especially in open shared quantum computing environments. Research in this area is largely challenged by the immaturity of the quantum hardware, quantum error correction, and how to best design secure quantum-safe network architectures in the long term, lack of frameworks for cryptography, and we have very little idea about the best way to use quantum computers to perform certain types of cryptographic attacks for periods well into the future, known as ‘collect now, break later’ attacks. This paper uses qualitative methodology which is based on systematic literature reviews, using case studies and a document analysis, with the purpose of providing an unabridged and precise assessment on the impact of quantum computing on network security. The study synthesizes the findings from several academic databases regarding the use of quantum technologies in real-world security applications. The findings highlight that quantum computing brings about breakthrough levels of computational power, as well as allowing for super-secure data transmission with quantum key distribution. But there are also new risks, such as crosstalk attacks, qubit sensing attacks and challenges from quantum decoherence and scalability. The paper identifies possible mitigation measures, including new techniques for quantum error correction, quantum-safe cryptography and novel approaches for quantum resources sharing. The findings are of significance for the economy and society as a whole, as they outline the urgency to shift security approaches for networks by developing quantum-safe algorithms and protocols, the importance of interdisciplinary collaboration to this end, and the need to develop policies to prepare for a post-quantum cryptographic era. This range of analysis offers to the researchers, policy-makers and industry professionals a roadmap and concrete guiding principles for future innovation and development of quantum-enhanced network security, concluding that although quantum computing poses as a profound security threat, it could, at the same time, offer revolutionary pathways for secure communications and data-protection when used properly.

Quantum computing; Quantum networks; Qubit; Superposition; Entanglement; Quantum gates; Quantum algorithms; Security issues; Decoherence; Cryptography

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2024-0337.pdf

Get Your e Certificate of Publication using below link

Download Certificate

Preview Article PDF

Isaiah Awende Otieno. Extensive review of quantum computing and network security. World Journal of Advanced Engineering Technology and Sciences, 2024, 12(02), 770–807. Article DOI: https://doi.org/10.30574/wjaets.2024.12.2.0337

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution