14 Code-based post-quantum cryptographic technique: digital signature
-
Swati Gupta
und Puneet Garg
Abstract
In order to prevent engineers, even those hazardous entertainers who have quantum enrolment of their own, from accessing information, quantum cryptography adds quantum mechanics standards to information encryption and transmission. The more widespread application of quantum cryptography similarly streamlines the development and performance of numerous cryptographic operations, leveraging the intriguing capabilities and power of quantum computers. Possibly, this type of PC can aid in the development of new, more sophisticated, and more effective encryption structures that are unable to comprehend using the current, conventional recruitment and communication methods. Quantum computer systems may cap in a position to interrupt all presently deployed public-key cryptographic algorithms. As those algorithms are critical to run a stable IT infrastructure, we urgently want to transition to the Malware capable of disrupting any active public-key cryptography algorithms that may face assaults from attackers to enter into large-scale quantum computer systems. Quantum computing is an upcoming era that targets to take advantage of quantum phenomena, consisting of superposition and entanglement, to carry out certain computational duties a lot extra effectively than currently feasible with conventional computing. Unlike conventional computer systems, quantum computer systems may be employed exponentially in many states at any moment, unlike classical computers, which can be used in some well-defined state at any point in time. The challenges of quantum computing has reinvigorated study efforts in all the areas of post-quantum cryptography, especially closer to making cryptosystems sensible by optimizing algorithms, featuring concrete parameter sets, and writing green and side-channel steady implementations.
Abstract
In order to prevent engineers, even those hazardous entertainers who have quantum enrolment of their own, from accessing information, quantum cryptography adds quantum mechanics standards to information encryption and transmission. The more widespread application of quantum cryptography similarly streamlines the development and performance of numerous cryptographic operations, leveraging the intriguing capabilities and power of quantum computers. Possibly, this type of PC can aid in the development of new, more sophisticated, and more effective encryption structures that are unable to comprehend using the current, conventional recruitment and communication methods. Quantum computer systems may cap in a position to interrupt all presently deployed public-key cryptographic algorithms. As those algorithms are critical to run a stable IT infrastructure, we urgently want to transition to the Malware capable of disrupting any active public-key cryptography algorithms that may face assaults from attackers to enter into large-scale quantum computer systems. Quantum computing is an upcoming era that targets to take advantage of quantum phenomena, consisting of superposition and entanglement, to carry out certain computational duties a lot extra effectively than currently feasible with conventional computing. Unlike conventional computer systems, quantum computer systems may be employed exponentially in many states at any moment, unlike classical computers, which can be used in some well-defined state at any point in time. The challenges of quantum computing has reinvigorated study efforts in all the areas of post-quantum cryptography, especially closer to making cryptosystems sensible by optimizing algorithms, featuring concrete parameter sets, and writing green and side-channel steady implementations.
Kapitel in diesem Buch
- Frontmatter I
- Preface V
- Contents VII
- Biographies XI
- List of contributors XIII
- 1 Optimizing the traffic flow in VANETs using deep quantum annealing 1
- 2 Quantum annealing-based routing in UAV network 13
- 3 Cyberbullying detection of social network tweets using quantum machine learning 25
- 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network 37
- 5 Machine learning-based quantum modeling to classify the traffic flow in smart cities 49
- 6 IoT attack detection using quantum deep learning in large-scale networks 67
- 7 Quantum transfer learning to detect passive attacks in SDN-IOT 79
- 8 Intrusion detection framework using quantum computing for mobile cloud computing 97
- 9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes 109
- 10 Study of quantum computing for data analytics of predictive and prescriptive analytics models 121
- 11 A review of different techniques and challenges of quantum computing in various applications 147
- 12 Review and significance of cryptography and machine learning in quantum computing 159
- 13 An improved genetic quantum cryptography model for network communication 177
- 14 Code-based post-quantum cryptographic technique: digital signature 193
- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks 207
- 16 RSA security implementation in quantum computing for a higher resilience 219
- 17 Application of quantum computing for digital forensic investigation 231
- 18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones 249
- 19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system 265
- 20 Mitigating the risk of quantum computing in cyber security era 283
- 21 IoMT-based data aggregation using quantum learning 301
- Index 319
Kapitel in diesem Buch
- Frontmatter I
- Preface V
- Contents VII
- Biographies XI
- List of contributors XIII
- 1 Optimizing the traffic flow in VANETs using deep quantum annealing 1
- 2 Quantum annealing-based routing in UAV network 13
- 3 Cyberbullying detection of social network tweets using quantum machine learning 25
- 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network 37
- 5 Machine learning-based quantum modeling to classify the traffic flow in smart cities 49
- 6 IoT attack detection using quantum deep learning in large-scale networks 67
- 7 Quantum transfer learning to detect passive attacks in SDN-IOT 79
- 8 Intrusion detection framework using quantum computing for mobile cloud computing 97
- 9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes 109
- 10 Study of quantum computing for data analytics of predictive and prescriptive analytics models 121
- 11 A review of different techniques and challenges of quantum computing in various applications 147
- 12 Review and significance of cryptography and machine learning in quantum computing 159
- 13 An improved genetic quantum cryptography model for network communication 177
- 14 Code-based post-quantum cryptographic technique: digital signature 193
- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks 207
- 16 RSA security implementation in quantum computing for a higher resilience 219
- 17 Application of quantum computing for digital forensic investigation 231
- 18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones 249
- 19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system 265
- 20 Mitigating the risk of quantum computing in cyber security era 283
- 21 IoMT-based data aggregation using quantum learning 301
- Index 319