Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing

Tallennettuna:
Bibliografiset tiedot
Julkaisussa:PLoS One vol. 19, no. 12 (Dec 2024), p. e0316274
Päätekijä: Almotiri, Sultan H
Julkaistu:
Public Library of Science
Aiheet:
Linkit:Citation/Abstract
Full Text
Full Text - PDF
Tagit: Lisää tagi
Ei tageja, Lisää ensimmäinen tagi!

MARC

LEADER 00000nab a2200000uu 4500
001 3150324100
003 UK-CbPIL
022 |a 1932-6203 
024 7 |a 10.1371/journal.pone.0316274  |2 doi 
035 |a 3150324100 
045 2 |b d20241201  |b d20241231 
084 |a 174835  |2 nlm 
100 1 |a Almotiri, Sultan H 
245 1 |a Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing 
260 |b Public Library of Science  |c Dec 2024 
513 |a Journal Article 
520 3 |a The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives. We use a multi-criteria decision-making methodology in this work to evaluate the efficacy of quantum computing approaches in improving software security. As the number of electronic applications grows, software developers strive to produce more sophisticated and user-friendly alternatives. However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. The rapid development of quantum bits (qubits) regarded as basic quantum entities adds complexity and risk to the software security landscape. As a result, in the age of quantum computing, evaluating software security becomes not only necessary but also critical. To accomplish this objective, we propose the Fuzzy Analytic Hierarchy Process (F-AHP), a soft computing method, as a reliable tool for accomplishing this goal. Our research aims to prioritise security variables using quantum security criteria, providing an innovative viewpoint on software security evaluation in the quantum computing era. 
653 |a Cryptography 
653 |a Information technology 
653 |a Software 
653 |a Quantum computing 
653 |a Quantum cryptography 
653 |a Analytic hierarchy process 
653 |a Software development 
653 |a Algorithms 
653 |a Soft computing 
653 |a Multiple criterion 
653 |a Hash based algorithms 
653 |a Cybersecurity 
653 |a Cybercrime 
653 |a Qubits (quantum computing) 
653 |a Computers 
653 |a Technology assessment 
653 |a Alternatives 
653 |a Decision making 
653 |a Complexity 
653 |a Economic 
773 0 |t PLoS One  |g vol. 19, no. 12 (Dec 2024), p. e0316274 
786 0 |d ProQuest  |t Health & Medical Collection 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3150324100/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3150324100/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3150324100/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch