Quantum Computers and Their Implications for Information Security

Authors

  • Handri Author

Abstract

implications for information security. Quantum computers leverage principles of quantum mechanics that enable computational capabilities far beyond those of classical computers, particularly in solving mathematical problems underlying modern cryptographic systems. This article aims to examine the implications of quantum computers for information security, focusing on both potential threats and emerging security solutions. The research method employed is a literature review, analyzing scientific journals, reference books, and recent studies related to quantum computing and cryptography. The results indicate that quantum computing poses serious risks to widely used cryptographic algorithms, such as public-key encryption and digital signatures. At the same time, it also offers new opportunities through the development of quantum-resistant cryptography and quantum key distribution. However, challenges related to technological readiness, infrastructure, and standardization remain significant. Therefore, understanding the implications of quantum computing is essential for preparing future information security systems that are resilient in the post-quantum era.

References

Veza, O., & Arifin, N. Y. (2025). Tinjauan literatur sistematis terhadap metode histogram of oriented gradients (HOG) pada pengolahan citra. Jurnal Sains Informatika Terapan, 4(3), 689–699.

Agustini, S., Arifin, N. Y., Veza, O., & Laurensius, A. (2025). Pengembangan sistem informasi layanan pengiriman kargo domestik. Jurnal Sains Informatika Terapan, 4(3), 682–688.

Arifin, N. Y., Veza, O., Setyabudhi, A. L., & Fernandes, A. L. (2024). Sosialisasi pentingnya cyber security untuk menjaga keamanan online studi Fakultas Teknik Informatika Universitas Ibnu Sina. Karya Nyata: Jurnal Pengabdian Kepada Masyarakat, 1(3), 46–51.

Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509.

Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. Proceedings of the 28th Annual ACM Symposium on Theory of Computing, 212–219.

Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on post-quantum cryptography. National Institute of Standards and Technology (NIST).

Published

2026-02-04

How to Cite

Quantum Computers and Their Implications for Information Security. (2026). Root Indexing, 2(01). https://worldscientificindex.com/index.php/winx/article/view/54