Limit search to available items
Book Cover
E-book
Author Pal, Om

Title Cyber Security Using Modern Technologies Artificial Intelligence, Blockchain and Quantum Cryptography
Published Milton : Taylor & Francis Group, 2023

Copies

Description 1 online resource (289 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Acknowledgments -- Editors -- List of Contributors -- Chapter 1 Quantum Computing: A Global Scenario -- 1.1 Introduction -- 1.2 Quantum Computing Terminology -- 1.2.1 Qubit -- 1.2.2 Superposition -- 1.2.3 Parallelism -- 1.2.4 Entanglement -- 1.3 Quantum Gates -- 1.3.1 Controlled NOT (CNOT) Gate -- 1.3.2 Hadamard Gate -- 1.3.3 Pauli-X Gate -- 1.3.4 Toffoli Gate -- 1.4 Need of Quantum Computing -- 1.5 Quantum Computing Approaches and Challenges -- 1.6 Quantum Computing Research Status
1.6.1 Quantum Computing Research Status in India -- 1.7 Conclusion and Future Directions -- References -- Chapter 2 Post-Quantum Digital Signatures -- 2.1 Introduction -- 2.1.1 Section-Wise Plan -- 2.1.2 Background Expected of the Reader -- 2.2 Preliminaries and Notations -- 2.2.1 Digital Signatures and Their Security -- 2.2.2 Secure Signatures in ROM -- 2.2.3 Modelling Quantum Adversary -- 2.3 NIST PQC Standardization Competition -- 2.3.1 Round Three Candidates -- 2.4 Lattice-Based Signatures -- 2.4.1 Hard Problems -- 2.4.2 NTRUSign -- 2.4.3 GPV Framework -- 2.4.3.1 Falcon Signature Scheme
2.4.4 Fiat-Shamir with Aborts -- 2.4.4.1 CRYSTALS-DILITHIUM Signature Scheme -- 2.5 MQ-Based Signatures -- 2.5.1 MQ-Based Hard Problems -- 2.5.2 Oil-Vinegar Signatures -- 2.5.2.1 Unbalanced Oil-Vinegar Signature -- 2.5.2.2 Rainbow Signature Scheme -- 2.5.2.3 LUOV Signature Scheme -- 2.5.3 HFE Signatures -- 2.5.3.1 GeMSS -- 2.6 Signatures Based on Symmetric Key Techniques -- 2.6.1 Picnic -- 2.6.1.1 ZKBoo -- 2.6.1.2 ZKB++ and Picnic -- 2.6.2 SPHINCS+ -- 2.7 Signatures Based on Supersingular Isogenies -- 2.7.1 Preliminaries on Elliptic Curves -- 2.7.2 Yoo et al. Scheme
2.7.3 A Discussion on Other Isogeny-Based Signatures -- 2.8 Some Interesting Use Cases -- 2.8.1 Certification Authority and Authentication in TLS -- 2.8.2 Secure and Verified Boot -- 2.8.3 Miscellaneous Applications -- 2.8.4 Challenges in Standardization, Migration, and Ubiquitous Usage of Such Schemes -- 2.9 Conclusions -- Acknowledgements -- Notes -- References -- Chapter 3 Analysis of Quantum Computing with Food Processing Use Case -- 3.1 Introduction -- 3.1.1 Need for Computational Analysis of Quantum Computing -- 3.1.2 Issues and Challenges in the Area of Quantum Computing
3.1.3 Applications of Quantum Computing -- 3.1.4 Paper Organization -- 3.2 Related Work -- 3.3 Role of Quantum Computing for HPC -- 3.3.1 Programming Model of Quantum Computing -- 3.3.2 Architecture of Quantum Computing -- 3.3.3 Methodology and Concepts for Quantum Computing -- 3.4 Quantum Computing Use Case for Food Processing -- 3.4.1 Proposed System Architecture -- 3.4.2 Applicability of Expected Outcomes -- 3.5 Summary -- References -- Chapter 4 Security of Modern Networks and its Challenges -- 4.1 Introduction to Modern Networks -- 4.2 Security of Modern Networks
Notes Description based upon print version of record
4.2.1 How Do We Deal with Network Security?
Subject Computer security -- Technological innovations
Form Electronic book
Author Kumar, Vinod
Khan, Rijwan
Alam, Bashir
Alam, Mansaf
ISBN 9781000908022
100090802X