Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS

Version 1 : Received: 4 October 2022 / Approved: 5 October 2022 / Online: 5 October 2022 (09:52:43 CEST)

How to cite: Nadeem, M.; Ansar, S. A.; Ahmad, M.; Pathak, P. C.; Kumar, D. R.; Khan, R. A. Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS. Preprints 2022, 2022100030. https://doi.org/10.20944/preprints202210.0030.v1 Nadeem, M.; Ansar, S. A.; Ahmad, M.; Pathak, P. C.; Kumar, D. R.; Khan, R. A. Evaluating Software Security in the Era of Quantum Computer by Using Fuzzy TOPSIS. Preprints 2022, 2022100030. https://doi.org/10.20944/preprints202210.0030.v1

Abstract

The development of quantum computers seeks software developers' attention regarding security in the era of Information Technology, software security is the primary goal for our quantitative assessment of software security in the development cycle of software. Security assessment of software is identifying the key security factors of the software. A security elective provides ex-tensive strategies and calculations to ensure product safety. The security assessment is the key factor in surveying, administering, and controlling security to further enhance the nature of safety. It should be acknowledged that assessing security early on in the development process is beneficial in identifying worms, hazards, flaws, and threats. The definition and portrayal of Quantum Computing (QC) in software security will be discussed in this study. Researchers use cryptography calculations to secure our financial institutions, medical devices, military weaponry, planes, ships, vehicles, and pilots. Here authors of this study use the Fuzzy Technique for Order Preference by Similarity to Ideal Situation (FTOPSIS) to quantitatively assess the weight/rank of the quantum enable security alternatives like (Diffie-Hellman key-exchange algorithm, Quantum key distribution algorithm, Deutsch-Jozsa Algorithm, Special Deutsch-Jozsa Algorithm, Grover’s Algorithm and Quantum key distribution algorithm in GHZ state) with security factors like (Confidentiality, Integrity, Authenti-cation, Privacy, Reliability, Maintainability, Authorization, Integrity, Possessions, and Availability). Additionally, they critically analyze and select the six alternatives of quantum-based security algorithms. The nature of safety infers the ability to execute a thing on time in this exploration study, specifically 'software security'.

Keywords

Quantum Computing; Software Security; Quantum Algorithm; Quantum Security.

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.