Open Access iconOpen Access

ARTICLE

crossmark

Analyzing the Data of Software Security Life-Span: Quantum Computing Era

Hashem Alyami1, Mohd Nadeem2, Wael Alosaimi3, Abdullah Alharbi3, Rajeev Kumar4,*, Bineet Kumar Gupta4, Alka Agrawal2, Raees Ahmad Khan2

1 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
2 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India
3 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
4 Department of Computer Applications, Shri Ramswaroop Memorial University, Barabanki, 225003, India

* Corresponding Author: Rajeev Kumar. Email: email

Intelligent Automation & Soft Computing 2022, 31(2), 707-716. https://doi.org/10.32604/iasc.2022.020780

Abstract

Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and algorithms to ensure the software security. Security estimation is the vital factor in assessing, administrating, controlling security to improve the nature of security. It is to be realized that assessment of security at early stage of development helps in identifying distinctive worms, dangers, weaknesses and threats. This paper will talk about the definition and characterization of quantum computing in software security. For software security, we use different cryptography (methods or algorithms to secure our financial organizations, medical devices, military weapons, planes, ships, automobiles, navigators, etc. However, many cryptosystems are likely to collapse when the large quantum computer is developed. Recently, Google developed the Sycamore Processor 53 qubits. Such innovations indicate the advent of large quantum computer in future. Since cryptographic algorithm can be solved by the quantum computers, the present cryptosystem would be rendered obsolete. Hence, it is imperative to focus more on intensive research in the context of the present quantum cyber security. The main challenges in quantum era would be cryptography methods that fulfill the demands of security usability and flexibility without sacrificing the users’ confidence. This research study, in particular, focuses on ‘Software durability’ which is a quality of security that alludes to the capacity to execution of an item on schedule. In the context of software and web application, a thorough assessment of security factors will significantly influence the software’s durability in the era of quantum computing.

Keywords


Cite This Article

APA Style
Alyami, H., Nadeem, M., Alosaimi, W., Alharbi, A., Kumar, R. et al. (2022). Analyzing the data of software security life-span: quantum computing era. Intelligent Automation & Soft Computing, 31(2), 707-716. https://doi.org/10.32604/iasc.2022.020780
Vancouver Style
Alyami H, Nadeem M, Alosaimi W, Alharbi A, Kumar R, Gupta BK, et al. Analyzing the data of software security life-span: quantum computing era. Intell Automat Soft Comput . 2022;31(2):707-716 https://doi.org/10.32604/iasc.2022.020780
IEEE Style
H. Alyami et al., “Analyzing the Data of Software Security Life-Span: Quantum Computing Era,” Intell. Automat. Soft Comput. , vol. 31, no. 2, pp. 707-716, 2022. https://doi.org/10.32604/iasc.2022.020780



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2300

    View

  • 1333

    Download

  • 0

    Like

Share Link