TY - GEN
T1 - Designing Hash and Encryption Engines using Quantum Computing
AU - Upadhyay, Suryansh
AU - Roy, Rupshali
AU - Ghosh, Swaroop
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Quantum computing (QC) holds the promise of revolutionizing problem-solving by exploiting quantum phenomena like superposition and entanglement. It offers exponential speed-ups across various domains, from machine learning and security to drug discovery and optimization. In parallel, quantum encryption and key distribution have garnered substantial interest, leveraging quantum engines to enhance cryptographic techniques. Classical cryptography faces imminent threats from quantum computing, exemplified by Shor's algorithm's capacity to breach established encryption schemes. However, quantum circuits and algorithms, capitalizing on superposition and entanglement, offer innovative avenues for enhancing security. In this paper we explore quantum-based hash functions and encryption to fortify data security. Quantum hash functions and encryption can have numerous potential application cases, such as password storage, digital signatures, cryptography, anti-tampering etc. The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.
AB - Quantum computing (QC) holds the promise of revolutionizing problem-solving by exploiting quantum phenomena like superposition and entanglement. It offers exponential speed-ups across various domains, from machine learning and security to drug discovery and optimization. In parallel, quantum encryption and key distribution have garnered substantial interest, leveraging quantum engines to enhance cryptographic techniques. Classical cryptography faces imminent threats from quantum computing, exemplified by Shor's algorithm's capacity to breach established encryption schemes. However, quantum circuits and algorithms, capitalizing on superposition and entanglement, offer innovative avenues for enhancing security. In this paper we explore quantum-based hash functions and encryption to fortify data security. Quantum hash functions and encryption can have numerous potential application cases, such as password storage, digital signatures, cryptography, anti-tampering etc. The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.
UR - http://www.scopus.com/inward/record.url?scp=85190377743&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85190377743&partnerID=8YFLogxK
U2 - 10.1109/VLSID60093.2024.00101
DO - 10.1109/VLSID60093.2024.00101
M3 - Conference contribution
AN - SCOPUS:85190377743
T3 - Proceedings of the IEEE International Conference on VLSI Design
SP - 571
EP - 576
BT - Proceedings - 37th International Conference on VLSI Design, VLSID 2024 - held concurrently with 23rd International Conference on Embedded Systems, ES 2024
PB - IEEE Computer Society
T2 - 37th International Conference on VLSI Design, VLSID 2024
Y2 - 6 January 2024 through 10 January 2024
ER -