Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.

The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research....

Full description

Saved in:
Bibliographic Details
Main Author: Sultan H Almotiri
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2024-01-01
Series:PLoS ONE
Online Access:https://doi.org/10.1371/journal.pone.0316274
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841533132742852608
author Sultan H Almotiri
author_facet Sultan H Almotiri
author_sort Sultan H Almotiri
collection DOAJ
description The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives. We use a multi-criteria decision-making methodology in this work to evaluate the efficacy of quantum computing approaches in improving software security. As the number of electronic applications grows, software developers strive to produce more sophisticated and user-friendly alternatives. However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. The rapid development of quantum bits (qubits) regarded as basic quantum entities adds complexity and risk to the software security landscape. As a result, in the age of quantum computing, evaluating software security becomes not only necessary but also critical. To accomplish this objective, we propose the Fuzzy Analytic Hierarchy Process (F-AHP), a soft computing method, as a reliable tool for accomplishing this goal. Our research aims to prioritise security variables using quantum security criteria, providing an innovative viewpoint on software security evaluation in the quantum computing era.
format Article
id doaj-art-f1fd0b5c2ac94544af3ecf619230c191
institution Kabale University
issn 1932-6203
language English
publishDate 2024-01-01
publisher Public Library of Science (PLoS)
record_format Article
series PLoS ONE
spelling doaj-art-f1fd0b5c2ac94544af3ecf619230c1912025-01-17T05:31:49ZengPublic Library of Science (PLoS)PLoS ONE1932-62032024-01-011912e031627410.1371/journal.pone.0316274Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.Sultan H AlmotiriThe introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives. We use a multi-criteria decision-making methodology in this work to evaluate the efficacy of quantum computing approaches in improving software security. As the number of electronic applications grows, software developers strive to produce more sophisticated and user-friendly alternatives. However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. The rapid development of quantum bits (qubits) regarded as basic quantum entities adds complexity and risk to the software security landscape. As a result, in the age of quantum computing, evaluating software security becomes not only necessary but also critical. To accomplish this objective, we propose the Fuzzy Analytic Hierarchy Process (F-AHP), a soft computing method, as a reliable tool for accomplishing this goal. Our research aims to prioritise security variables using quantum security criteria, providing an innovative viewpoint on software security evaluation in the quantum computing era.https://doi.org/10.1371/journal.pone.0316274
spellingShingle Sultan H Almotiri
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
PLoS ONE
title Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
title_full Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
title_fullStr Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
title_full_unstemmed Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
title_short Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
title_sort quantum resilient software security a fuzzy ahp based assessment framework in the era of quantum computing
url https://doi.org/10.1371/journal.pone.0316274
work_keys_str_mv AT sultanhalmotiri quantumresilientsoftwaresecurityafuzzyahpbasedassessmentframeworkintheeraofquantumcomputing