Abstract
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software’s durability and security is a dynamic aspect in assessing, administrating, and controlling security for strengthening the features of security. This paper essentially emphasises the demarcation and depiction of quantum computing from a software security perspective. At present, different symmetrical-based cryptography approaches or algorithms are being used to protect different government and non-government sectors, such as banks, healthcare sectors, defense, transport, automobiles, navigators, weather forecasting, etc., to ensure software durability and security. However, many crypto schemes are likely to collapse when a large qubit-based quantum computer is developed. In such a scenario, it is necessary to pay attention to the security alternatives based on quantum computing. Presently, the different factors of software durability are usability, dependability, trustworthiness, and human trust. In this study, we have also classified the durability level in the second stage. The intention of the evaluation of the impact on security over quantum duration is to estimate and assess the security durability of software. In this research investigation, we have followed the symmetrical hybrid technique of fuzzy analytic hierarchy process (FAHP) and fuzzy technique for order of preference by similarity to ideal solution (FTOPSIS). The obtained results, and the method used in this estimation, would make a significant contribution to future research for organising software security and durability (SSD) in the presence of a quantum computer.
Highlights
Software security and durability (SSD) in the development cycle of software has, at present, created new difficulties for developers [1]
The security of software is based on utilising the approach of the security key, which is a number according to the Shor calculation
Quantum-based applications are currently being created across the globe
Summary
Software security and durability (SSD) in the development cycle of software has, at present, created new difficulties for developers [1]. The astonishing extension of computing in the quantum period and tremendous improvement in programming have generated the necessity for building effective security mechanisms in the initial stages of software development itself. The software developers themselves face several challenges that include limitations in improvement because of cost, time-to-market necessities, profitability sway, consumer loyalty concerns, etc. The outcome of such issues has inappropriately evolved secure programming with low security [5]. Quantum security manages the retreat in the time of quantum registering These days, the pace of advancement in quantum innovation is dramatic. The entire time spent by a traditional computer can be factored without interruption by the long term
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have