Page 109 - Cyber Defense eMagazine September 2023
P. 109
applications. There would be a need to focus on the choice of algorithms, the design of protocols, the
evaluation of performance, and the verification of strength.
As with the development of every new technology, there are unintended consequences. For example, in
terms of quantum computing, it is a new threat to underlined crypto infrastructure. But this is how we
evolve, innovate and come up with more advanced novel solutions. This is how post-quantum
cryptography was born to promote security and privacy in the presence of quantum computers. The post-
quantum cryptography holds immense potential to safeguard the security of our digital future against any
quantum threats. Therefore, there is a need to dedicate efforts to strengthen the current infrastructure
with post-quantum cryptography.
About the Author
Maila Zahra is a student of cybersecurity at Air University, Islamabad, Pakistan. She
also works for the National Science and Technology Park and actively participates
in national-level hackathons. Her research interests include quantum computing,
post-quantum cryptography, and various cutting-edge topics in the field of
cybersecurity.
Zia Muhammad is a Ph.D. scholar at the Department of Computer Science, North
Dakota State University (NDSU). He is a cybersecurity professional,
academician, and researcher who has taken professional training and
certifications. He has authored several publications in peer-reviewed
conferences and journals in the field of cybersecurity. Zia can be reached online
at ([email protected], https://www.linkedin.com/in/zianoedar/).
Cyber Defense eMagazine – September 2023 Edition 109
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.