Version 1
: Received: 4 October 2022 / Approved: 5 October 2022 / Online: 5 October 2022 (09:52:43 CEST)
How to cite:
Nadeem, M.; Ansar, S. A.; Ahmad, M.; Pathak, P. C.; Kumar, D. R.; Khan, R. A. Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS. Preprints2022, 2022100030. https://doi.org/10.20944/preprints202210.0030.v1
Nadeem, M.; Ansar, S. A.; Ahmad, M.; Pathak, P. C.; Kumar, D. R.; Khan, R. A. Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS. Preprints 2022, 2022100030. https://doi.org/10.20944/preprints202210.0030.v1
Nadeem, M.; Ansar, S. A.; Ahmad, M.; Pathak, P. C.; Kumar, D. R.; Khan, R. A. Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS. Preprints2022, 2022100030. https://doi.org/10.20944/preprints202210.0030.v1
APA Style
Nadeem, M., Ansar, S. A., Ahmad, M., Pathak, P. C., Kumar, D. R., & Khan, R. A. (2022). Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS. Preprints. https://doi.org/10.20944/preprints202210.0030.v1
Chicago/Turabian Style
Nadeem, M., Dr. Rajeev Kumar and Raees Ahmad Khan. 2022 "Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS" Preprints. https://doi.org/10.20944/preprints202210.0030.v1
Abstract
The development of quantum computers seeks software developers' attention regarding security in the era of Information Technology, software security is the primary goal for our quantitative assessment of software security in the development cycle of software. Security assessment of software is identifying the key security factors of the software. A security elective provides ex-tensive strategies and calculations to ensure product safety. The security assessment is the key factor in surveying, administering, and controlling security to further enhance the nature of safety. It should be acknowledged that assessing security early on in the development process is beneficial in identifying worms, hazards, flaws, and threats. The definition and portrayal of Quantum Computing (QC) in software security will be discussed in this study. Researchers use cryptography calculations to secure our financial institutions, medical devices, military weaponry, planes, ships, vehicles, and pilots. Here authors of this study use the Fuzzy Technique for Order Preference by Similarity to Ideal Situation (FTOPSIS) to quantitatively assess the weight/rank of the quantum enable security alternatives like (Diffie-Hellman key-exchange algorithm, Quantum key distribution algorithm, Deutsch-Jozsa Algorithm, Special Deutsch-Jozsa Algorithm, Grover’s Algorithm and Quantum key distribution algorithm in GHZ state) with security factors like (Confidentiality, Integrity, Authenti-cation, Privacy, Reliability, Maintainability, Authorization, Integrity, Possessions, and Availability). Additionally, they critically analyze and select the six alternatives of quantum-based security algorithms. The nature of safety infers the ability to execute a thing on time in this exploration study, specifically 'software security'.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.