0% found this document useful (0 votes)
1 views18 pages

Pawan Report

The document discusses the ethical and security implications of quantum computing, highlighting its potential to disrupt current encryption methods and raise privacy concerns. It emphasizes the need for post-quantum cryptography and ethical frameworks to ensure responsible development, while addressing issues of access inequality and environmental impact. The report calls for international collaboration and governance to manage the risks associated with quantum technology effectively.

Uploaded by

Sachith Kuger kg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views18 pages

Pawan Report

The document discusses the ethical and security implications of quantum computing, highlighting its potential to disrupt current encryption methods and raise privacy concerns. It emphasizes the need for post-quantum cryptography and ethical frameworks to ensure responsible development, while addressing issues of access inequality and environmental impact. The report calls for international collaboration and governance to manage the risks associated with quantum technology effectively.

Uploaded by

Sachith Kuger kg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

CCA QUANTUM COMPUTING AND PHOTONICS (BPHYCS22)

BMS INSTITUTE OF TECHNOLOGY AND MANAGEMENT


(Autonomous Institute affiliated to Visvesvaraya Technological University,
Belagavi)
Avalahalli, Doddaballapura Main Road, Bengaluru – 560064

DEPARTMENT OF PHYSICS

Continuous Comprehensive Assessment (CCA) for CIE


A literature review on Quantum Computing and Its Applications

Topic Title: Ethical and Security Implications of Quantum


Computing

Name of the student PAWAN J GOWDA


USN 1TD24CS197
Branch/Semester / section CSE/II/CSE-3
Course name /Course code Quantum computing and
photonics
(BPHYCS22)
Name of the course DR DARUKA PRASAD
coordinator
Date of submission 12/06/2025
Max. marks
10 M
Marks obtained

Preparati
Submis on of Demonstr Fundament
To
sion of report ation al
tal
report and (03M) knowledge
(10
on time Complete (02M)
M)
(1 M) ness of
report
(04 M)
Signature of the student Signature of the course
coordinato
1
ETHICAL AND SECURITY IMPLICATIONs
OF QUANTUM COMPUTING
Abstract :
Ǫuantum computing is on the verge of transforming entire
industries-from pharmaceuticals and logistics to artificial
intelligence. By using the principles of quantum mechanics,
these machines can tackle problems that classical
computers simply can't handle, potentially accelerating
both scientific discovery and commercial innovation. But
with this leap forward comes serious ethical and security
challenges. Experts warn that within the next decade,
quantum systems could break widely used public-key
encryption, putting online communication, digital
transactions, and blockchain infrastructure at risk. In
response, researchers are working on post-quantum
cryptography (PǪC) and advocating for "crypto agility" to
help future-proof today's systems. Organizations like NIST
are leading the charge in creating quantum-resistant
encryption standards. The growing concern over "harvest-
now, decrypt-later" (HNDL) attacks adds urgency to these
efforts, as sensitive data sent today could be saved and
decrypted once quantum computers become powerful
enough. These machines could also supercharge
surveillance and data analysis, raising new privacy
concerns and national security risks. To ensure responsible
development, we need ethical frameworks focused on
accountability, fairness, and transparency. Policymakers
and industry leaders emphasize the importance of inclusive
innovation so that quantum benefits don't remain
concentrated in just a few hands. Right now, a small group
of countries and corporations
dominate the field, risking deeper global inequalities.
International collaboration and education will be key to
ensuring quantum progress benefits everyone. In the end,
balancing innovation with strong safeguards and
cooperation is the only path to a secure and ethical
quantum future.

Introduction :
Ǫuantum computing is set to change the way we approach
problems that are too complex for even the most advanced
traditional systems. Unlike classical computers that process
information using binary bits (0s and 1s), quantum
computers use qubits-units that can exist in multiple states
at once thanks to quantum phenomena like superposition.
This unique ability allows them to perform massively
parallel computations, with big implications for fields like
cryptography, machine learning, and
material science. The term "Ǫ-Day" has been coined to
describe the moment when quantum computers can crack
today's encryption standards. If that day arrives, it could
expose vast amounts of sensitive data, with serious
consequences not just for cybersecurity but also for ethics
and society at large. Beyond these technical threats, there
are big questions around who controls this powerful
technology. Currently, development is being led by a small
number of wealthy nations and tech giants, raising concerns
about a widening digital divide. If access remains limited,
the benefits of quantum innovation might be reserved for a
select few. And because quantum tech has both civilian and
military uses, regulating its development becomes even
more complicated. For example, the same tools that help
develop life-saving drugs could
also be used for advanced weapons or surveillance.
Environmental impact is another issue that can't be ignored.
Many quantum systems-especially those based on
superconducting qubits- require extremely cold
environments, which consume a lot of energy. As the
technology scales up, so will its environmental footprint,
potentially clashing with climate goals. This report explores
these interconnected challenges. It looks at how quantum
computing threatens current cryptographic methods,
examines the transition to quantum-resistant security, and
considers the ethical, social, and environmental
implications. It also highlights efforts by institutions like
NIST and the World Economic Forum to guide responsible
innovation. The goal is to offer a well-rounded view of how
to harness quantum potential while minimizing harm.

Literature Review:
A. Ǫuantum Computing and Cryptographic Vulnerabilities
Concerns about quantum threats go back to 1994 when
Peter Shor showed that a quantum computer could
efficiently break RSA and elliptic-curve encryption. More
recent estimates by researchers
like Gidney and Ekera suggest that cracking a 2048-bit RSA
key could require about 20 million qubits. That kind of
computing power isn't available yet, but experts-including
IBM's Dario Gil- believe it could be within reach in the next
10 to 15 years.
B. The "Harvest-Now, Decrypt-Later" Model Some data, like
health records or government secrets, remain valuable for
decades. That's why hackers might intercept encrypted data
today and store it, planning to decrypt it later when
quantum computers are strong
enough. This strategy, known as HNDL, is already influencing
cybersecurity planning. There are even signs that some actors
are targeting satellite links and VPN traffic using this
approach, which only adds pressure to adopt quantum-safe
cryptography.

C. Standardizing Post-Ǫuantum Cryptography To stay ahead


of quantum threats, NIST launched a global competition to
develop secure encryption methods. In 2024, it introduced
draft standards for ML-KEM (for key exchange) and Dilithium
(for digital signatures). These are based on tough
mathematical problems, like module- LWE, that quantum
computers can't solve easily. Still, moving to these new
standards won't be easy-it involves overhauling everything
from software to network hardware.

D. Governance and Ethical Norms Because quantum tech


can be used in both helpful and harmful ways, global
organizations are stepping in with ethical guidelines. The
World Economic Forum's 2022 report stressed principles like
fairness, openness, and sustainability. A follow-up in 2023
raised concerns about a "quantum divide," warning that
most funding and talent is concentrated in just a few
countries. The report pushed for broader international
participation.

E. Surveillance and Military Implications Ǫuantum tech has


game- changing potential in medicine and environmental
science-but it also has darker uses. Ǫuantum sensors could
detect hidden weapons or monitor individuals through
walls, while quantum communication can create secure
military channels. Many governments, including NATO
members, are investing in these technologies, raising
serious questions about ethics and privacy.
F.Educational and Infrastructure Gaps Access to quantum
education and equipment is uneven. A 2024 study found
that most
U.S. quantum programs are housed in elite institutions,

leaving

rural and underserved communities behind. Globally, the


cost of equipment like dilution refrigerators puts
participation out of reach for many countries. This only
deepens existing inequalities in the tech world.

G. Environmental Impact Ǫuantum systems, especially


those that rely on superconducting qubits, require intense
cooling. Running a quantum computer that cracks a 2048-
bit RSA key might use as much power as a small city does
in a day. That's why researchers are exploring more
energy-efficient technologies, like photonic chips that work
at room temperature.

H. Research Gaps and Ethical Dilemmas There are still many


unanswered questions. How reliable will quantum error
correction be? Can quantum systems integrate safely with
classical ones? Are post-quantum algorithms vulnerable to
other kinds of attacks? And on the ethics side: who stands
to benefit from quantum breakthroughs? How transparent
can we make these complex algorithms? How do we factor
in environmental costs?

Results and Discussion :


A. Impending Cryptographic Risk Ǫuantum computers are
steadily moving toward the capability to break today's
encryption. Algorithms like Shor's make it theoretically
possible, and while such quantum systems aren't here yet,
agencies around the world
are already preparing for that future. Adopting quantum-safe
cryptography is no longer optional-it's becoming a necessity.

B. Future Data Breaches via HNDL The HNDL threat makes it


clear that data stolen today might be decrypted years down
the line. This has major implications for sectors that handle
long-lasting sensitive information, like healthcare, finance,
and government. If action isn't taken soon, the damage
could be severe.

C. Ethical Divide in Access Ǫuantum tech remains out of


reach for many due to cost and geography. Right now,
most advancements are being made in a handful of
countries and by a few big corporations. This could lead to
monopolies over powerful technologies and deepen digital
inequality unless broader access is prioritized.

D.Surveillance and Weaponization Ǫuantum tools are


already being developed for military and surveillance
applications. From stealth detection to secure
communications, these technologies are transforming
intelligence operations-but also sparking debates about
civil liberties and ethical use.

E. Energy Demands and Environmental Impact The high


energy demands of quantum computers, especially those
requiring cryogenic cooling, are a growing concern.
Future systems could have a massive carbon footprint
unless more energy-efficient designs are developed.

F.Need for Global Ǫuantum Governance Despite progress


in areas like PǪC, there's no unified global approach to
managing quantum tech. Many experts are now calling for
international agreements-
similar to those used in nuclear arms control-to ensure
responsible development and use of quantum systems.

Conclusion :
Ǫuantum computing promises a future filled with powerful
tools and groundbreaking discoveries, but it also presents
real challenges to our current systems for trust, privacy, and
equality. Its ability to break existing encryption is a looming
threat, and the delay in adopting quantum-resistant
technologies only increases the risk. At the same time, the
concentration of quantum resources, potential for misuse in
surveillance or warfare, and environmental concerns all
highlight the need for careful oversight.
Moving forward, we'll need collaboration across disciplines
and borders. Security teams must speed up PǪC deployment,
policymakers should push for inclusive regulation, and
technologists must consider the ethical and environmental
impact of their work. With the right approach, we can build
a quantum future that's not only advanced-but also secure,
fair, and sustainable.

References (in IEEE format)


[1]P. W. Shor, "Algorithms for quantum computation: discrete
logarithms and factoring," Proc. 35th Ann. Symp. Found. Comput.
Sci., 1994.

[2] C. Gidney and M. Ekera, "How to factor 2048-bit RSA integers in


8 hours using 20 million noisy qubits."

[3]NIST, "Post-Ǫuantum Cryptography Standardization Project."


[4]World Economic Forum, "Ǫuantum Computing Governance
Principles."

[5] S. Parker and L. Vermeer, "Ǫuantifying the energy cost of


breaking RSA using a quantum computer."

[6] D. Gil et al., "Security in the Ǫuantum Era," IBM Ǫuantum.

[7]A. Mosca and M. Mosca, "Cybersecurity in an era with


quantum computers," IEEE Security C Privacy.

[8] R. Palem, "Cryogenic energy demand of quantum computing,"


Nature Electronics.

[9] CNAS, "Ǫuantum Hegemony? China's Ambitions and the Global


Race."

[10] A. Broadbent et al., "Post-Ǫuantum Cryptography: Current


State."

[11] ETSI, "Ǫuantum-Safe Cryptography and Security."

[12] A. Karamlou and W. Oliver, "The cryogenic bottleneck," IEEE


Spectrum.

[13] World Economic Forum, "Ǫuantum Economy Blueprint."

[14] M. Gambetta et al., "IBM Ǫuantum 2025 Roadmap," IBM


Research.

[15] K. Thompson, "Ǫuantum Readiness in Financial Services,"


Accenture.

You might also like