Date
4-29-2026
Department
Helms School of Government
Degree
Doctor of Philosophy in Criminal Justice (PhD)
Chair
Jared Perry
Keywords
quantum computing, homeland security, encryption, cryptography, Shor’s Algorithm, Grover’s Algorithm, Routine Activity Theory
Disciplines
Sociology
Recommended Citation
Gerlach, Thomas C., "Protecting Computer Systems in the Post-Quantum World" (2026). Doctoral Dissertations and Projects. 8335.
https://digitalcommons.liberty.edu/doctoral/8335
Abstract
The 20th century saw remarkable growth due to technological advances, with many of the most significant advances due in no small part to the transistor and the computer revolution it spawned. During the last several decades, an even more transformative technology has been making incredible advances: quantum computing. Quantum computers will significantly impact computer security, with a profound risk to encryption and privacy. However, because of the incredibly complicated nature of quantum computing and the variety of fields involved, quantum computing continues to be viewed as science fiction by many and is failing to garner enough attention within the computer science community. This lack of attention provides opportunities for foreign government agencies to capture data for future exploitation before the computer community reacts with appropriate safeguards. This study performed a qualitative analysis of survey data provided by information technology professionals intended to identify the knowledge they have regarding quantum computing. Results of the survey showed that our systems lack capable guardians, as defined by the Routine Activity Theory, and that we are highly vulnerable to future quantum attacks. This creates a major national security risk which can be mitigated by increased dissemination of information to technology professionals, upgrading the requirements of the Cyber Workforce Qualification Program, providing financial incentives for businesses, or creating legislation requiring businesses to act. Because of the time-sensitive nature of this risk, quick action will be needed to keep America’s data safe from foreign intelligence and organized crime groups.
