Integration of artificial intelligence in cyber security systems to counter quantum computing threats

Authors

  • Maria Atik Sunarti Ekowati Universitas Pignatelli Triputra, Indonesia
  • Moyo Hady Poernomo Universitas Sebelas Maret, Indonesia
  • Zefanya Permata Nindyatama Universitas Sebelas Maret, Indonesia

DOI:

https://doi.org/10.35335/mandiri.v13i4.388

Keywords:

Artificial Intelligence, Cybersecurity, Machine Learning, Post-Quantum Cryptography, Quantum Computing

Abstract

With the rapid advancement in quantum computing, threats to cybersecurity systems are increasingly complex, especially in terms of encryption and data protection. The integration of artificial intelligence (AI) into cybersecurity systems is essential to address these challenges. This study aims to examine the potential of AI in improving the detection and mitigation capabilities of threats arising from the quantum computing revolution. The urgency of this research is driven by the prediction that existing cryptographic algorithms will be easily cracked by quantum computers, raising the need for more adaptive and dynamic security systems. The method used in this study is a simulation approach using machine learning algorithms to model and identify cyber threat patterns specific to quantum computing. The results show that AI-based systems can detect attacks faster and with higher accuracy compared to conventional systems. The output of this research is the development of a security system prototype that combines artificial intelligence and post-quantum security technologies, which can be implemented in various cyber applications to ensure more effective data protection in the quantum computing era.

References

Ahmed, S. (2024). The Impact of Artificial Intelligence on Cybersecurity. International Journal of Computers and Informatics, 3(2). https://doi.org/10.59992/ijci.2024.v3n2p3

Aryanto, E., Mabruk, H., & Narendroputro, W. (2023). Artificial Intelligence Implementation Strategy to Make It Happen Smart Government Indonesia Gold 2045. International Journal of Science and Society, 5(5). https://doi.org/10.54783/ijsoc.v5i5.877

Balamurugan, C., Singh, K., Ganesan, G., & Rajarajan, M. (2021). Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions. In Cryptography (Vol. 5, Issue 4). https://doi.org/10.3390/cryptography5040038

Botwe, B. O., Antwi, W. K., Arkoh, S., & Akudjedu, T. N. (2021). Radiographers’ perspectives on the emerging integration of artificial intelligence into diagnostic imaging: The Ghana study. Journal of Medical Radiation Sciences, 68(3). https://doi.org/10.1002/jmrs.460

Bovelle, D. R., & Campbell, D. R. (2023). Healthcare Blockchain Quantum Computing Threats and Opportunities. Blockchain in Healthcare Today, 6(1). https://doi.org/10.30953/bhty.v6.263

Covers, O., & Doeland, M. (2020). How the financial sector can anticipate the threats of quantum computing to keep payments safe and secure. Journal of Payments Strategy and Systems, 14(2). https://doi.org/10.69554/zutp3146

Denker, K., & Javaid, A. Y. (2019). Quantum Computing as a Threat to Modern Cryptography Techniques. Int’l Conf. Foundations of Computer Scienc.

Denning, D. (2019). Is Quantum Computing a Cybersecurity Threat? American Scientist, 107(2). https://doi.org/10.1511/2019.107.2.83

Fadillah, R., & Fasa, M. I. (2021). DIGITAL ECONOMIC TRANSFORMATION : OPTIMALISASI EKONOMI DIGITAL PASCA PANDEMI COVID-19 PADA PELAKU UMKM. JURNAL MANAJEMEN & ORGANISASI REVIEW (MANOR), 3(2). https://doi.org/10.47354/mjo.v3i2.303

Gadge, K., Borkar, P., Daduria, S., Badhiye, S., Sarodaya, A., & Raut, R. (2024). Quantum Computing Threats: Study the Potential Threats that Quantum Computing Poses to Blockchain Security. International Journal of Intelligent Systems and Applications in Engineering, 12(10s).

Ginting, E., Eka Putri, S., Yonatan Sinaga, Z., William Iskandar Ps, J. V, Baru, K., Percut Sei Tuan, K., Deli Serdang, K., & Penulis, K. (2024). Analisis Keterkaitan Pemerintah Pusat dalam Peningkatan APBN dan APBD Tahun Anggaran 2023. Jurnal Ilmu Hukum Dan Sosial, 2(1).

Hummelholm, A., Hämäläinen, T., & Savola, R. (2023). AI-based Quantum-safe Cybersecurity Automation and Orchestration for edge Intelligence in Future Networks. European Conference on Information Warfare and Security, ECCWS, 2023-June. https://doi.org/10.34190/eccws.22.1.1211

Khalil, U., Malik, O. A., Uddin, M., & Chen, C. L. (2022). A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions. In Sensors (Vol. 22, Issue 14). https://doi.org/10.3390/s22145168

Kilber, N., Kaestle, D., & Wagner, S. (2021). Cybersecurity for quantum computing. CEUR Workshop Proceedings, 3008.

Kuang, R., & Barbeau, M. (2022). Quantum permutation pad for universal quantum-safe cryptography. Quantum Information Processing, 21(6). https://doi.org/10.1007/s11128-022-03557-y

Lee, C. C., Tan, T. G., Sharma, V., & Zhou, J. (2021). Quantum Computing Threat Modelling on a Generic CPS Setup. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12809 LNCS. https://doi.org/10.1007/978-3-030-81645-2_11

Li, Q., Fang, Z., & Qu, M. (2023). Security Oriented Analysis and Design Framework for Cyber - Physical - Social Enterprise. IFAC-PapersOnLine, 56(2). https://doi.org/10.1016/j.ifacol.2023.10.348

Lu, Y., Wang, D., Obaidat, M. S., & Vijayakumar, P. (2023). Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems. IEEE Internet of Things Journal, 10(4). https://doi.org/10.1109/JIOT.2022.3151828

Maheshwari, A., Jain, M., Tiwari, V., Ingle, M., & Chourey, A. (2023). Is quantum computing a cybersecurity threat? In Quantum Computing in Cybersecurity. https://doi.org/10.1002/9781394167401.ch21

Muneer, S. M., Alvi, M. B., & Farrakh, A. (2023). Cyber Security Event Detection Using Machine Learning Technique. International Journal of Computational and Innovative Sciences, 2(2).

Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. (2019). Post-quantum lattice-based cryptography implementations: A survey. In ACM Computing Surveys (Vol. 51, Issue 6). https://doi.org/10.1145/3292548

Pan, D., Long, G. L., Yin, L., Sheng, Y. B., Ruan, D., Ng, S. X., Lu, J., & Hanzo, L. (2024). The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet. IEEE Communications Surveys and Tutorials, 26(3). https://doi.org/10.1109/COMST.2024.3367535

Petrenko, K., Mashatan, A., & Shirazi, F. (2019). Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. Journal of Information Security and Applications, 46. https://doi.org/10.1016/j.jisa.2019.03.007

Radanliev, P. (2024). Artificial intelligence and quantum cryptography. In Journal of Analytical Science and Technology (Vol. 15, Issue 1). https://doi.org/10.1186/s40543-024-00416-6

Rangaraju, S. (2023). SECURE BY INTELLIGENCE: ENHANCING PRODUCTS WITH AI-DRIVEN SECURITY MEASURES. EPH - International Journal of Science And Engineering, 9(3). https://doi.org/10.53555/ephijse.v9i3.212

Samuel Onimisi Dawodu, Adedolapo Omotosho, Odunayo Josephine Akindote, Abimbola Oluwatoyin Adegbite, & Sarah Kuzankah Ewuga. (2023). CYBERSECURITY RISK ASSESSMENT IN BANKING: METHODOLOGIES AND BEST PRACTICES. Computer Science & IT Research Journal, 4(3). https://doi.org/10.51594/csitrj.v4i3.659

Schärer, K., & Comuzzi, M. (2023). The quantum threat to blockchain: summary and timeline analysis. Quantum Machine Intelligence, 5(1). https://doi.org/10.1007/s42484-023-00105-4

Shamsan Saleh, A. M. (2024). Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review. In Blockchain: Research and Applications (Vol. 5, Issue 3). https://doi.org/10.1016/j.bcra.2024.100193

Sriwijayanti, H. (2021). Analisis Pengaruh Transparansi, Akuntabilitas Dan Pemanfaatan Sistem Informasi Akuntansi Keuangan Daerah Terhadap Pengelolaan APBD (Studi Persepsi Pengelola Apbd Skpd Dinas Pemerintah Kota Padang). Jurnal Ekobistek. https://doi.org/10.35134/ekobistek.v7i1.6

Tuptuk, N., Hazell, P., Watson, J., & Hailes, S. (2021). A systematic review of the state of cyber-security in water systems. In Water (Switzerland) (Vol. 13, Issue 1). https://doi.org/10.3390/w13010081

Verma, A., Bhattacharya, P., Madhani, N., Trivedi, C., Bhushan, B., Tanwar, S., Sharma, G., Bokoro, P. N., & Sharma, R. (2022). Blockchain for Industry 5.0: Vision, Opportunities, Key Enablers, and Future Directions. IEEE Access, 10. https://doi.org/10.1109/ACCESS.2022.3186892

Yuliana Sri Purbiyati, Lusy, & Rikardus Sina Koten. (2023). KREATIF PASCA PANDEMI COVID 19. ASAWIKA: Media Sosialisasi Abdimas Widya Karya, 8(1). https://doi.org/10.37832/asawika.v8i01.127

Downloads

Published

2025-04-21

How to Cite

Ekowati, M. A. S., Poernomo, M. H., & Nindyatama, Z. P. (2025). Integration of artificial intelligence in cyber security systems to counter quantum computing threats. Jurnal Mandiri IT, 13(4), 389–398. https://doi.org/10.35335/mandiri.v13i4.388