Cybersecurity with Quantum Cryptography: An Analysis of Current Techniques and Future Trends
Abstract
Using a systematic literature review methodology comprising the following stages: Identification of Relevant Literature, Screening and Selection, Data Extraction and Synthesis, Qualitative Analysis, and SWOT Analysis, this paper explores the role of quantum cryptography in enhancing cybersecurity. The analysis begins with an introduction to the vulnerabilities of classical cryptography in the context of quantum computing advancements. It delves into Quantum Key Distribution (QKD) protocols such as BB84 and E91, Quantum Random Number Generators (QRNGs), and post-quantum cryptography algorithms in detail. Real-world case studies are presented to illustrate the practical applications and advancements in quantum cryptographic techniques. Additionally, the paper addresses the challenges associated with implementing quantum cryptography and proposes strategies for its integration with existing cybersecurity frameworks. The discussion on future trends highlights anticipated technological advancements, potential applications in quantum internet and blockchain security, suggested research directions, and policy implications. The significance of quantum cryptography in securing sensitive data and establishing trust in critical sectors is thoroughly emphasized.
Downloads
References
Omol, E.J. (2024), "Organizational digital transformation: from evolution to future trends", Digital Transformation and Society, Vol. 3 No. 3, pp. 240-256. https://doi.org/10.1108/DTS-08-2023-0061
Omol, E., Mburu, L., & Abuonji, P (2023). Digital Maturity Action Fields for SMEs in Developing Economies. Journal of Environmental Science, Computer Science, and Engineering & Technology, 12(3), https://doi.org/10.24214/jecet.B.12.3.10114.
Hao, K., Xin, J., Wang, Z., & Wang, G. (2020). Outsourced data integrity verification based on blockchain in untrusted environment. World Wide Web, 23, 2215-2238.
Shor, P. W. (1994). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 124-134.
Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175-179.
Stallings, W. (2017). Cryptography and network security: Principles and practice. Pearson.
Faruk, M. J. H., Tahora, S., Tasnim, M., Shahriar, H., & Sakib, N. (2022, May). A review of quantum cybersecurity: threats, risks and opportunities. In 2022 1st International Conference on AI in Cybersecurity (ICAIC) (pp. 1-8). IEEE.
Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on post-quantum cryptography. NISTIR 8105. National Institute of Standards and Technology.
Ekert, A. K. (1991). Quantum cryptography based on Bell's theorem. Physical Review Letters, 67(6), 661-663.
Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145-195.
Herrero-Collantes, M., & Garcia-Escartin, J. C. (2017). Quantum random number generators. Reviews of Modern Physics, 89(1), 015004.
ID Quantique. (n.d.). Quantum cryptography. Retrieved from https://www.idquantique.com/quantum-cryptography/
Misoczki, R., Barreto, P. S. L. M., & Avanzi, R. M. (2013). McBits: fast constant-time code-based cryptography. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 45-56.
Peikert, C. (2009). Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 333-342.
Yin, J., Cao, Y., Li, Y. H., Ren, J. G., Liao, S. K., Zhang, L., ... & Pan, J. W. (2017). Satellite-based entanglement distribution over 1200 kilometers. Science, 356(6343), 1140-1144.
Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences, 34(8), 5766-5781.
Einstein, A., Podolsky, B., & Rosen, N. (1935). Can quantum-mechanical description of physical reality be considered complete? Physical Review, 47(10), 777-780.
Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. CRYPTO 1999: Advances in Cryptology, 388-397.
Lenstra, A. K. (2001). Unbelievable security: Matching AES security using public key systems. Advances in Cryptology - ASIACRYPT 2001, 67-86.
Liao, S. K., Cai, W. Q., Handsteiner, J., Liu, B., Yin, J., Zhang, L., ... & Pan, J. W. (2017). Satellite-relayed intercontinental quantum network. Nature, 549(7670), 43-47.
Lyubashevsky, V., Peikert, C., & Regev, O. (2010). On ideal lattices and learning with errors over rings. Journal of the ACM (JACM), 60(6), 43.
Nielsen, M. A., & Chuang, I. L. (2010). Quantum computation and quantum information: 10th anniversary edition. Cambridge University Press.
Preskill, J. (2018). Quantum computing in the NISQ era and beyond. Quantum, 2, 79.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
Sanguinetti, B., Martin, A., Zbinden, H., & Gisin, N. (2014). Quantum random number generation on a mobile phone. Physical Review X, 4(3), 031056.
Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dusek, M., Lutkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301-1350.
Singh, A., Dev, K., Siljak, H., Joshi, H. D., & Magarini, M. (2021). Quantum internet—applications, functionalities, enabling technologies, challenges, and research directions. IEEE Communications Surveys & Tutorials, 23(4), 2218-2247.
Balogh, S., Gallo, O., Ploszek, R., Špaček, P., & Zajac, P. (2021). IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques. Electronics, 10(21), 2647.
Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang, Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9, 36038-36077.
NIST. (2016). Post-Quantum Cryptography. National Institute of Standards and Technology. Retrieved from https://csrc.nist.gov/projects/post-quantum-cryptography
Bernstein, D. J., Buchmann, J., & Dahmen, E. (Eds.). (2009). Post-Quantum Cryptography. Springer.
Cambridge Quantum Computing. (2021). Securing Data Centers with Quantum Cryptography. Retrieved from https://cambridgequantum.com/
Elliott, C., et al. (2005). Current status of the DARPA quantum network. Quantum Information and Computation, 3(6), 371-394.
European Commission. (2020). Quantum Flagship Initiative. Retrieved from https://ec.europa.eu/digital-strategy
AIT. (2018). Quantum communication in healthcare. Austrian Institute of Technology. Retrieved from https://www.ait.ac.at
Omol, E., Mburu, L., & Abuonji, P. (2024). Unlocking Digital Transformation: The Pivotal Role of Data Analytics and Business Intelligence Strategies. International Journal of Knowledge Content Development & Technology Vol.14, No.3, 77-91.
Omol, E., Mburu, L., & Onyango, D. (2024a). Anomaly Detection in IoT Sensor Data Using Machine Learning Techniques for Predictive Maintenance in Smart Grids. International Journal of Science, Technology & Management, 5(1), 201-210.
Omol, E., Onyangor, D., Mburu, L., & Abuonji, P. (2024b). Application of K-Means Clustering for Customer Segmentation in Grocery Stores in Kenya. International Journal of Science, Technology & Management, 5(1), 192-200.
Omol E., Mburu L., & Abuonji P. (2024c). Pioneering digital transformation in Africa: the path to maturity amidst unique challenges and opportunities. Can. J. Bus. Inf. Stud., 6(2), 35-48. https://doi.org/10.34104/cjbis.024.035048
Omol, E. J., Onyango, D. A., Mburu, L. W., & Abuonji, P. A. (2024d). Apriori Algorithm and Market Basket Analysis to Uncover Consumer Buying Patterns: Case of a Kenyan Supermarket. Buana Information Technology and Computer Sciences (BIT and CS), 5(2), 51-63. https://doi.org/10.36805/bit-cs.v5i2.6082
Omol, E. J., Mburu, L. W., & Abuonji, P. A. (2024). Digital maturity assessment model (DMAM): assimilation of design science research (DSR) and capability maturity model integration (CMMI). Digital Transformation and Society.
Omol, E., Abuonji, P., & Mburu, L. (2024). SMEs’ digital maturity: analyzing influencing factors and the mediating role of environmental factors. Journal of Innovative Digital Transformation, (ahead-of-print).
Copyright (c) 2025 International Journal of Science, Technology & Management

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.