Integration of artificial intelligence in cyber security systems to counter quantum computing threats
DOI:
https://doi.org/10.35335/mandiri.v13i4.388Keywords:
Artificial Intelligence, Cybersecurity, Machine Learning, Post-Quantum Cryptography, Quantum ComputingAbstract
With the rapid advancement in quantum computing, threats to cybersecurity systems are increasingly complex, especially in terms of encryption and data protection. The integration of artificial intelligence (AI) into cybersecurity systems is essential to address these challenges. This study aims to examine the potential of AI in improving the detection and mitigation capabilities of threats arising from the quantum computing revolution. The urgency of this research is driven by the prediction that existing cryptographic algorithms will be easily cracked by quantum computers, raising the need for more adaptive and dynamic security systems. The method used in this study is a simulation approach using machine learning algorithms to model and identify cyber threat patterns specific to quantum computing. The results show that AI-based systems can detect attacks faster and with higher accuracy compared to conventional systems. The output of this research is the development of a security system prototype that combines artificial intelligence and post-quantum security technologies, which can be implemented in various cyber applications to ensure more effective data protection in the quantum computing era.
References
Ahmed, S. (2024). The Impact of Artificial Intelligence on Cybersecurity. International Journal of Computers and Informatics, 3(2). https://doi.org/10.59992/ijci.2024.v3n2p3
Aryanto, E., Mabruk, H., & Narendroputro, W. (2023). Artificial Intelligence Implementation Strategy to Make It Happen Smart Government Indonesia Gold 2045. International Journal of Science and Society, 5(5). https://doi.org/10.54783/ijsoc.v5i5.877
Balamurugan, C., Singh, K., Ganesan, G., & Rajarajan, M. (2021). Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions. In Cryptography (Vol. 5, Issue 4). https://doi.org/10.3390/cryptography5040038
Botwe, B. O., Antwi, W. K., Arkoh, S., & Akudjedu, T. N. (2021). Radiographers’ perspectives on the emerging integration of artificial intelligence into diagnostic imaging: The Ghana study. Journal of Medical Radiation Sciences, 68(3). https://doi.org/10.1002/jmrs.460
Bovelle, D. R., & Campbell, D. R. (2023). Healthcare Blockchain Quantum Computing Threats and Opportunities. Blockchain in Healthcare Today, 6(1). https://doi.org/10.30953/bhty.v6.263
Covers, O., & Doeland, M. (2020). How the financial sector can anticipate the threats of quantum computing to keep payments safe and secure. Journal of Payments Strategy and Systems, 14(2). https://doi.org/10.69554/zutp3146
Denker, K., & Javaid, A. Y. (2019). Quantum Computing as a Threat to Modern Cryptography Techniques. Int’l Conf. Foundations of Computer Scienc.
Denning, D. (2019). Is Quantum Computing a Cybersecurity Threat? American Scientist, 107(2). https://doi.org/10.1511/2019.107.2.83
Fadillah, R., & Fasa, M. I. (2021). DIGITAL ECONOMIC TRANSFORMATION : OPTIMALISASI EKONOMI DIGITAL PASCA PANDEMI COVID-19 PADA PELAKU UMKM. JURNAL MANAJEMEN & ORGANISASI REVIEW (MANOR), 3(2). https://doi.org/10.47354/mjo.v3i2.303
Gadge, K., Borkar, P., Daduria, S., Badhiye, S., Sarodaya, A., & Raut, R. (2024). Quantum Computing Threats: Study the Potential Threats that Quantum Computing Poses to Blockchain Security. International Journal of Intelligent Systems and Applications in Engineering, 12(10s).
Ginting, E., Eka Putri, S., Yonatan Sinaga, Z., William Iskandar Ps, J. V, Baru, K., Percut Sei Tuan, K., Deli Serdang, K., & Penulis, K. (2024). Analisis Keterkaitan Pemerintah Pusat dalam Peningkatan APBN dan APBD Tahun Anggaran 2023. Jurnal Ilmu Hukum Dan Sosial, 2(1).
Hummelholm, A., Hämäläinen, T., & Savola, R. (2023). AI-based Quantum-safe Cybersecurity Automation and Orchestration for edge Intelligence in Future Networks. European Conference on Information Warfare and Security, ECCWS, 2023-June. https://doi.org/10.34190/eccws.22.1.1211
Khalil, U., Malik, O. A., Uddin, M., & Chen, C. L. (2022). A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions. In Sensors (Vol. 22, Issue 14). https://doi.org/10.3390/s22145168
Kilber, N., Kaestle, D., & Wagner, S. (2021). Cybersecurity for quantum computing. CEUR Workshop Proceedings, 3008.
Kuang, R., & Barbeau, M. (2022). Quantum permutation pad for universal quantum-safe cryptography. Quantum Information Processing, 21(6). https://doi.org/10.1007/s11128-022-03557-y
Lee, C. C., Tan, T. G., Sharma, V., & Zhou, J. (2021). Quantum Computing Threat Modelling on a Generic CPS Setup. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12809 LNCS. https://doi.org/10.1007/978-3-030-81645-2_11
Li, Q., Fang, Z., & Qu, M. (2023). Security Oriented Analysis and Design Framework for Cyber - Physical - Social Enterprise. IFAC-PapersOnLine, 56(2). https://doi.org/10.1016/j.ifacol.2023.10.348
Lu, Y., Wang, D., Obaidat, M. S., & Vijayakumar, P. (2023). Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems. IEEE Internet of Things Journal, 10(4). https://doi.org/10.1109/JIOT.2022.3151828
Maheshwari, A., Jain, M., Tiwari, V., Ingle, M., & Chourey, A. (2023). Is quantum computing a cybersecurity threat? In Quantum Computing in Cybersecurity. https://doi.org/10.1002/9781394167401.ch21
Muneer, S. M., Alvi, M. B., & Farrakh, A. (2023). Cyber Security Event Detection Using Machine Learning Technique. International Journal of Computational and Innovative Sciences, 2(2).
Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. (2019). Post-quantum lattice-based cryptography implementations: A survey. In ACM Computing Surveys (Vol. 51, Issue 6). https://doi.org/10.1145/3292548
Pan, D., Long, G. L., Yin, L., Sheng, Y. B., Ruan, D., Ng, S. X., Lu, J., & Hanzo, L. (2024). The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet. IEEE Communications Surveys and Tutorials, 26(3). https://doi.org/10.1109/COMST.2024.3367535
Petrenko, K., Mashatan, A., & Shirazi, F. (2019). Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. Journal of Information Security and Applications, 46. https://doi.org/10.1016/j.jisa.2019.03.007
Radanliev, P. (2024). Artificial intelligence and quantum cryptography. In Journal of Analytical Science and Technology (Vol. 15, Issue 1). https://doi.org/10.1186/s40543-024-00416-6
Rangaraju, S. (2023). SECURE BY INTELLIGENCE: ENHANCING PRODUCTS WITH AI-DRIVEN SECURITY MEASURES. EPH - International Journal of Science And Engineering, 9(3). https://doi.org/10.53555/ephijse.v9i3.212
Samuel Onimisi Dawodu, Adedolapo Omotosho, Odunayo Josephine Akindote, Abimbola Oluwatoyin Adegbite, & Sarah Kuzankah Ewuga. (2023). CYBERSECURITY RISK ASSESSMENT IN BANKING: METHODOLOGIES AND BEST PRACTICES. Computer Science & IT Research Journal, 4(3). https://doi.org/10.51594/csitrj.v4i3.659
Schärer, K., & Comuzzi, M. (2023). The quantum threat to blockchain: summary and timeline analysis. Quantum Machine Intelligence, 5(1). https://doi.org/10.1007/s42484-023-00105-4
Shamsan Saleh, A. M. (2024). Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review. In Blockchain: Research and Applications (Vol. 5, Issue 3). https://doi.org/10.1016/j.bcra.2024.100193
Sriwijayanti, H. (2021). Analisis Pengaruh Transparansi, Akuntabilitas Dan Pemanfaatan Sistem Informasi Akuntansi Keuangan Daerah Terhadap Pengelolaan APBD (Studi Persepsi Pengelola Apbd Skpd Dinas Pemerintah Kota Padang). Jurnal Ekobistek. https://doi.org/10.35134/ekobistek.v7i1.6
Tuptuk, N., Hazell, P., Watson, J., & Hailes, S. (2021). A systematic review of the state of cyber-security in water systems. In Water (Switzerland) (Vol. 13, Issue 1). https://doi.org/10.3390/w13010081
Verma, A., Bhattacharya, P., Madhani, N., Trivedi, C., Bhushan, B., Tanwar, S., Sharma, G., Bokoro, P. N., & Sharma, R. (2022). Blockchain for Industry 5.0: Vision, Opportunities, Key Enablers, and Future Directions. IEEE Access, 10. https://doi.org/10.1109/ACCESS.2022.3186892
Yuliana Sri Purbiyati, Lusy, & Rikardus Sina Koten. (2023). KREATIF PASCA PANDEMI COVID 19. ASAWIKA: Media Sosialisasi Abdimas Widya Karya, 8(1). https://doi.org/10.37832/asawika.v8i01.127
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Maria Atik Sunarti Ekowati, Moyo Hady Poernomo, Zefanya Permata Nindyatama

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.