Designing Hash and Encryption Engines using Quantum Computing

Suryansh Upadhyay, Rupshali Roy, Swaroop Ghosh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Quantum computing (QC) holds the promise of revolutionizing problem-solving by exploiting quantum phenomena like superposition and entanglement. It offers exponential speed-ups across various domains, from machine learning and security to drug discovery and optimization. In parallel, quantum encryption and key distribution have garnered substantial interest, leveraging quantum engines to enhance cryptographic techniques. Classical cryptography faces imminent threats from quantum computing, exemplified by Shor's algorithm's capacity to breach established encryption schemes. However, quantum circuits and algorithms, capitalizing on superposition and entanglement, offer innovative avenues for enhancing security. In this paper we explore quantum-based hash functions and encryption to fortify data security. Quantum hash functions and encryption can have numerous potential application cases, such as password storage, digital signatures, cryptography, anti-tampering etc. The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.

Original languageEnglish (US)
Title of host publicationProceedings - 37th International Conference on VLSI Design, VLSID 2024 - held concurrently with 23rd International Conference on Embedded Systems, ES 2024
PublisherIEEE Computer Society
Pages571-576
Number of pages6
ISBN (Electronic)9798350384406
DOIs
StatePublished - 2024
Event37th International Conference on VLSI Design, VLSID 2024 - Kolkata, West Bengal, India
Duration: Jan 6 2024Jan 10 2024

Publication series

NameProceedings of the IEEE International Conference on VLSI Design
ISSN (Print)1063-9667

Conference

Conference37th International Conference on VLSI Design, VLSID 2024
Country/TerritoryIndia
CityKolkata, West Bengal
Period1/6/241/10/24

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Designing Hash and Encryption Engines using Quantum Computing'. Together they form a unique fingerprint.

Cite this