Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing
Tallennettuna:
| Julkaisussa: | PLoS One vol. 19, no. 12 (Dec 2024), p. e0316274 |
|---|---|
| Päätekijä: | |
| Julkaistu: |
Public Library of Science
|
| Aiheet: | |
| Linkit: | Citation/Abstract Full Text Full Text - PDF |
| Tagit: |
Ei tageja, Lisää ensimmäinen tagi!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3150324100 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1932-6203 | ||
| 024 | 7 | |a 10.1371/journal.pone.0316274 |2 doi | |
| 035 | |a 3150324100 | ||
| 045 | 2 | |b d20241201 |b d20241231 | |
| 084 | |a 174835 |2 nlm | ||
| 100 | 1 | |a Almotiri, Sultan H | |
| 245 | 1 | |a Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing | |
| 260 | |b Public Library of Science |c Dec 2024 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives. We use a multi-criteria decision-making methodology in this work to evaluate the efficacy of quantum computing approaches in improving software security. As the number of electronic applications grows, software developers strive to produce more sophisticated and user-friendly alternatives. However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. The rapid development of quantum bits (qubits) regarded as basic quantum entities adds complexity and risk to the software security landscape. As a result, in the age of quantum computing, evaluating software security becomes not only necessary but also critical. To accomplish this objective, we propose the Fuzzy Analytic Hierarchy Process (F-AHP), a soft computing method, as a reliable tool for accomplishing this goal. Our research aims to prioritise security variables using quantum security criteria, providing an innovative viewpoint on software security evaluation in the quantum computing era. | |
| 653 | |a Cryptography | ||
| 653 | |a Information technology | ||
| 653 | |a Software | ||
| 653 | |a Quantum computing | ||
| 653 | |a Quantum cryptography | ||
| 653 | |a Analytic hierarchy process | ||
| 653 | |a Software development | ||
| 653 | |a Algorithms | ||
| 653 | |a Soft computing | ||
| 653 | |a Multiple criterion | ||
| 653 | |a Hash based algorithms | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Cybercrime | ||
| 653 | |a Qubits (quantum computing) | ||
| 653 | |a Computers | ||
| 653 | |a Technology assessment | ||
| 653 | |a Alternatives | ||
| 653 | |a Decision making | ||
| 653 | |a Complexity | ||
| 653 | |a Economic | ||
| 773 | 0 | |t PLoS One |g vol. 19, no. 12 (Dec 2024), p. e0316274 | |
| 786 | 0 | |d ProQuest |t Health & Medical Collection | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3150324100/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3150324100/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3150324100/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |