Paper Topic: Quantum Computing and Cyber Security Paper Directions: The paper should be at least 10 pages in length using 12 point Times Roman font, not including graphics, tables, and a list of references (in a reference list at the end of the paper no footnotes on each page). The references should be primary sources by academic and professional authors (e.g., no Wikipedia) , published in peer reviewed journals no earlier than 2005. References should use APA formatting. Your paper should be submitted in a Word file (doc or docx format). The original papers or links thereto must be submitted in a separate Word file. I need the original papers in pdf format if possible. This text must be included, has a chapter on Quantum Computing and Security with figures and diagrams. Found powerpoints online. Security in Computing (5th ed)Author: Charles P. Pfleeger and Shari L. PfleegerPublisher: Prentice Hall, 2015 If not available, then use: Security in Computing (4th ed) Author: Charles P. Pfleeger and Shari L. PfleegerPublisher: Prentice Hall, 2006 Paper Topic: Write a research paper on the problem of maintaining cyber security (individual servers, computers and networks, both private and public including internet) as quantum computing is introduced. Include in your paper a detailed explanation of quantum computing, a comprehensive review of the challenges to cyber security and encryption presented by quantum computing, and a detailed explanation of current research regarding the solutions to the challenges presented that are currently being investigated. Dialog with Instructor, needs to be mitigated and fleshed out in paper: Questions: I wanted to ask your thoughts and/or direction on the Quantum Computing topic. Specifically, what were you looking for in terms of quantum computing? The reason I ask is that we ve looked into quantum computing for a couple R&D projects here. XX has a D-Wave Quantum Computer. It can only answer specific questions and problems have to be tailored for it in terms of 1 and 0 s. The answer has to be expressed as a set of ones and zeros, which are interpreted by a Hamiltonian which is like a fitness function in Genetic Algorithms. Each qubit produces a single one or zero, eventually. It uses thermal annealing to start out somewhere between one and zero, and eventually winds up at one of those two states. An example D-Wave quantum computer has 512 qubits. So for penetration testing, hacking, etc, the D-Wave would not provide an easy avenue for a hacker to exploit. Plus, it s cumbersome to program for the average programmer. Typically researchers and scientists would only use the D-Wave to answer a specific question. Answer from Instructor: The details you describe could be expanded upon as part of your paper, but I expect your paper to have a broader scope to include a comprehensive set of threats to quantum computers as well as threats by users of quantum computer enhanced computational speed (e.g., to decrypt messages, break password security, etc).