This cutting-edge new volume provides a comprehensive exploration of emerging technologies and trends in quantum computing and how it is used in cybersecurity, covering everything from artificial intelligence to how quantum computing can be used to secure networks and prevent cyber crime.
Table of ContentsPreface
1. Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big DataAnil V. Turukmane and Ganesh Khekare
1.1 Introduction
1.2 Denial-of-Service Attacks
1.2.1 DoS Attacks in Real Life
1.3 Related Work
1.3.1 Probabilistic Packet Marking (PPM)
1.3.1.1 DoS Attacks
1.3.1.2 FDPM
1.3.1.3 Simulation Surroundings via Extending ns2
1.4 Proposed Methodology
1.4.1 Denial of Service
1.4.1.1 Direct DDoS Attacks
1.4.1.2 Distributed DDoS Attacks
1.4.1.3 Reflector DDoS Attacks
1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking
1.5.1 A Brief Review of the Packet Marking Procedure
1.5.2 Packet Marking
1.5.3 Path Selection
1.5.4 Packet Sending
1.5.5 Packet Marking and Logging
1.5.6 Path Reconstruction
1.6 Conclusion
References
2. Secure Distinctive Data Transmission in Fog System Using Quantum CryptographyAmbika N.
2.1 Introduction
2.2 Properties of Quantum Computing
2.3 Applications of Quantum Computing
2.4 Background
2.5 Literature Survey
2.6 Proposed Work
2.7 Analysis of the Study
2.8 Conclusion
References
3. DDoS Attack and Defense Mechanism in a ServerPranav Bhatnagar, Shreya Pai and Minhaj Khan
3.1 Introduction
3.2 DoS Attack
3.3 DDoS Attack
3.4 DDoS Mitigation
3.5 Conclusion
Acknowledgement
References
4. Dark Web Content Classification Using Quantum EncodingAshwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud
4.1 Introduction
4.2 Related Work
4.3 Proposed Approach
4.4 Result and Discussion
4.5 Conclusion
References
5. Secure E-Voting Scheme Using BlockchainShrimoyee Banerjee and Umesh Bodkhe
5.1 Introduction
5.1.1 General Introduction
5.1.1.1 Key Components of the Blockchain Architecture
5.1.1.2 Characteristics of Blockchain Architecture
5.1.2 Electronic Voting System Using Quantum Blockchain
5.1.3 Architecture
5.1.4 Objective
5.1.5 Problem Statement
5.2 Literature Survey
5.2.1 Overview
5.3 Implementation and Methodology
5.3.1 Description
5.3.2 Installing Dependencies
5.3.3 Running
5.4 Result Analysis & Output
5.5 Conclusion and Future Directions
References
6. An Overview of Quantum Computing–Based Hidden Markov ModelsB. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal
6.1 Introduction
6.2 Elaboration of Hidden Quantum Markov Model
6.3 Example of HQMMs (Isolated Word Recognition in Action)
6.4 Matching of State Observation Density
6.5 Conclusion and Results
References
7. Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future PerspectivesTejashwa Agarwal and Amit Kumar Tyagi
7.1 Introduction to OS, AI and ML
7.1.1 A Brief Summary
7.1.2 Different Components of AI Integrated with the OS
7.2 Learning Configurations
7.3 Building ML Models
7.4 Work Done in Improving Process Scheduling
7.4.1 OS Agents
7.5 Artificial Intelligence in Distributed Operating Systems
7.6 Current Progress
7.6.1 Advantages
7.6.2 Concerns
7.7 Quantum Artificial Intelligence
7.8 Conclusion
References
8. Techno-Nationalism and Techno-Globalization: A Perspective from the National Security ActHepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu
8.1 Introduction
8.1.1 Techno-Globalism
8.1.2 National Security Act
8.1.2.1 Conditions when NSA can be Evoked
8.1.2.2 Safeguarding People Against the Act
8.1.2.3 Misuse of NSA
8.1.2.4 Need for Review
8.1.2.5 Critical Infrastructure and the Need of National Security Act’s Reformation
8.1.3 Techno-Nationalism
8.1.3.1 Rise of Techno-Nationalism
8.1.3.2 The Rise of Industrial Policy Revolution
8.1.3.3 Human Capital as a Strategic Asset
8.1.3.4 Academic Institutions Being the New Ground Zero
8.1.3.5 Decoupling of the Knowledge Networks
8.1.3.6 Rise of China’s Techno-Nationalism
8.1.3.7 China’s Achievement so far in Collaboration with Taiwan
8.1.3.8 Techno-Nationalism: The Issue of Cyber Vulnerability won’t be Resolved
8.2 Conclusion
Acknowledgement
References
9. Quantum Computing Based on CybersecurityP. William, Vivek Parganiha and D.B. Pardeshi
9.1 Introduction
9.2 Preliminaries
9.3 Threat Landscape
9.4 Defensive Measurements, Countermeasures, and Best Practises
9.5 Conclusion
References
10. Quantum Cryptography for the Future Internet and the Security AnalysisP. William, A.B. Pawar and M.A. Jawale
10.1 Introduction
10.2 Related Works
10.3 Preliminaries
10.3.1 Properties of Quantum Information
10.3.2 Quantum Communication System
10.4 Quantum Cryptography for Future Internet
10.4.1 Unconditional Security
10.4.2 Sniffing Detection
10.4.3 Security of the QKD
10.5 Conclusion
References
11. Security Aspects of Quantum CryptographyP. William, Siddhartha Choubey and Abha Choubey
11.1 Introduction
11.2 Literature Survey
11.3 Quantum Key Distribution
11.4 Cryptography
11.5 Quantum Cryptography with Faint Laser Pulses
11.6 Eavesdropping
11.7 Conclusion
References
12. Security Aspects of Quantum Machine Learning: Opportunities, Threats and DefensesP. William, Vivek Parganiha and D.B. Pardeshi
12.1 Introduction
12.2 Quantum Computing Basics
12.2.1 Qubits, Quantum Gates & Measurements
12.2.2 Quantum Noise
12.2.3 Quantum Neural Networks (QNN)
12.3 Security Applications
12.3.1 PCB Defect Classification
12.3.2 Hardware Trojan & Recycled Chip Detection
12.3.3 Usage Model of QML in Hardware Security
12.4 Quantum Machine Learning
12.4.1 Assets and Vulnerabilities
12.4.2 Attack Models and Defenses Unreliable Hardware Allocator
12.5 Conclusion
References
13. Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the FutureNirav Bhatt and Amit Kumar Tyagi
13.1 Introduction
13.2 Background
13.3 Scope of this Work
13.4 Methodology and Analysis of Simulation Results
13.5 Quantum-Based Cybersecurity and Forensics
13.5.1 Quantum-Based Cybersecurity
13.5.2 Quantum-Based Forensics
13.6 Conclusion and Future Works
References
14. Quantum Computing: A Software Engineering ApproachMradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma
14.1 Introduction
14.2 Background of Research Area
14.3 Why Cryptography?
14.3.1 Application-to-Application Communication Reference
14.3.2 Modes of Block Cyphers
14.3.3 Secret Key Cryptography Algorithms in Use Today
14.4 Classical Cryptography
14.5 Quantum Cryptography (QCr)
14.6 Quantum Key Distribution
14.6.1 Application (Key-Related Work)
14.6.2 Problem Statement
14.7 Cryptanalysis
14.8 Entanglement
14.9 Quantum Teleportation
14.10 Applications of QCr in Cybersecurity
14.11 Quantum Key Distribution Protocols Implementation
14.12 Research and Work
14.13 Challenges Faced by QC
14.14 Limitations
14.15 Conclusion
References
15. Quantum Computing to the Advantage of Neural NetworkAditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat
15.1 Introduction
15.2 Significance of Quantum Computers in Machine Learning
15.3 Related Work
15.4 Proposed Methodology
15.5 Result and Analysis
15.6 Conclusion
Glossary
References
16. Image Filtering Based on VQA with Quantum SecurityAvni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan
16.1 Introduction
16.2 Related Work
16.3 Problem Statement
16.4 Working
16.5 Proposed Methodology Solution
16.6 Result Analysis
16.7 Conclusion
References
17. Quantum Computing Techniques Assessment and RepresentationDewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om Kumar C.U. and D. Jeyakumar
17.1 Introduction
17.1.1 History of Computing
17.1.2 Innovative Ways of Computing
17.1.3 Need for QComp
17.2 Fundamentals of QC
17.3 Properties of QC
17.3.1 Behaviour
17.3.2 Superposition
17.3.3 Entanglement
17.3.4 Interference
17.4 Topography of QC
17.5 The Architecture of QC
17.5.1 Hardware and Software of QCOMP
17.6 Quantum Algorithm
17.7 Design Limitations of Quantum Computer
17.8 Different Categories of Quantum Computer
17.8.1 Analog Quantum Computer
17.8.2 NISQ Gate-Based Computer
17.8.3 Gate-Based Quantum Computer with Full Error Correction
17.9 Advantages of QC
17.10 Disadvantages of QC
17.11 Applications of QC
17.12 Major Challenges in QC
17.13 Conclusion
References
18. Quantum Computing Technological Design Along with Its Dark SideDivyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat and Anjali Rawat
18.1 Introduction
18.2 Related Work
18.3 History and Evolution of QCOM
18.4 Components & Concepts that Make QCOM Possible
18.5 Plans for the Future Development of Quantum Computer
18.6 Dark Side of QCOM
18.7 Plans for Protection in Quantum Era
18.8 Conclusion
References
19. Quantum Technology for Military ApplicationsSarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat and Kiran Pachlasiya
19.1 Introduction
19.2 Related Work
19.3 Overview of QTECH
19.3.1 Quantum Information Science
19.3.2 Qcomm
19.3.2.1 Quantum Simulations
19.3.2.2 Quantum Searching and Quantum Walks
19.3.2.3 Quantum Cryptoanalysis
19.3.2.4 Quantum Linear Algebra
19.3.2.5 Quantum Optimisations
19.3.3 Quantum Communication and Cryptography
19.3.3.1 Post-Quantum Cryptography
19.3.3.2 Quantum Random Number Generator
19.3.3.3 Quantum Network
19.3.3.4 Quantum Key Distribution
19.3.4 Quantum Sensing and Metrology
19.3.4.1 Quantum Clocks
19.3.4.2 Quantum RF Antenna
19.3.4.3 Quantum Radar Technology
19.3.4.4 Quantum Electric, Magnetic and Inertial Forces Sensing
19.3.4.5 Quantum Imaging Systems
19.3.4.6 Other Sensors and Technology
19.4 QTECH in Defence
19.4.1 TRL and Time Horizon
19.4.2 QTech Countermeasures
19.4.3 Quantum Strategy
19.5 Military Applications of QTECH
19.5.1 Capabilities of Qcomm
19.5.2 Quantum Cybersecurity
19.5.3 Quantum PNT
19.5.4 Quantum Communication Network
19.5.5 Quantum Electronic Warfare
19.5.6 Quantum ISTAR
19.5.7 Chemical and Biological Simulations and Detection
19.5.8 New Material Design
19.5.9 Quantum Radar and Lidar
19.5.10 Quantum Space Warfare
19.5.11 Quantum Underwater Warfare
19.6 Challenges and Consequences of Quantum Warfare
19.6.1 Technical Repercussions and Difficulties
19.6.2 Challenges and Consequences for Ethics and Peace
19.6.3 Consequences and Challenges for Military
19.7 Conclusion
References
20. Potential Threats and Ethical Risks of Quantum ComputingApurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar, Shrikant Telang and Anjali Rawat
20.1 Introduction
20.1.1 Knowledge of Quantum Computing
20.1.2 Limitations of Quantum Computing
20.1.3 Quantum Computer vs. Classical Computer
20.1.4 Diving Deep into Quantum Computers
20.1.5 Three Potential Ethical Issues Associated with Quantum Computing
20.1.6 Sensitive Data in the Open
20.2 Research Design & Methodology
20.2.1 Research Objectives
20.2.2 Primary Studies Selection
20.3 Brief In-Depth Overview of Possible Vulnerabilities
20.3.1 Quantum Technology’s Risk to Cybersecurity
20.3.1.1 How may Cybersecurity be Improved by Using Quantum Computing?
20.3.1.2 Risks Associated with Quantum Computers
20.3.1.3 What is the Most Pressing Cybersecurity Issue that Executives
are Presently Facing?
20.3.1.4 What Potential Risks Could Quantum Computing Pose?
20.3.1.5 Hacking Quantum Computers is Not Possible
20.3.1.6 Do Any Quantum Computers Exist now that are Available for Purchase?
20.3.2 Ethical Conditions and Risks
20.3.3 Protect Yourselves Against these Threats
20.3.3.1 Implement Industry Security Guidelines
20.3.3.2 Establish Zero Trust
20.3.3.3 Automated Tools Deployment
20.3.3.4 Put Controlled Threat Detection into Practice
20.3.4 Potential Threats and Existing Risks
20.3.4.1 Cybersecurity
20.3.4.2 Access
20.3.4.3 Artificial Intelligence, Data Harvesting, and Privacy
20.3.4.4 Explainability
20.3.4.5 Global Tensions and the Quantum “Arms Race”
20.4 New Risks to be Created
20.4.1 Health Care and Life Sciences
20.4.2 Emerging Materials
20.5 Futuristic Picture of Quantum Ethics
20.5.1 Quantum Computing is Coming of Age
20.6 Conclusion
References
21. Is Quantum Computing a Cybersecurity Threat?Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish Chourey
21.1 Introduction
21.1.1 Need for Cybersecurity
21.1.2 What is Quantum Computing?
21.1.3 What is Cryptography?
21.1.4 Symmetric Cryptography
21.1.5 Asymmetric Cryptography
21.1.6 Classical and Quantum Cryptography
21.1.7 Quantum Computing’s Effects on Existing Cryptography
21.1.8 Cryptography Does Not Mean Security
21.2 How QCom Threatens Cybersecurity
21.3 How QCom could Improve Cybersecurity
21.4 Quantum Cryptography and Its Applications
21.5 Proposed Methodology
21.5.1 The Threat of Quantum to Cybersecurity
21.5.2 QCom
21.5.3 QCom Challenge
21.6 Background/Objective
21.7 Conclusion
References
22. Quantum Computing in Data Security: A Critical AssessmentSadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun Jhapate and Divyani Joshi
22.1 Introduction
22.2 Present Cryptographic Algorithms and Systems
22.3 Comparing Traditional Computing and Quantum Computing
22.4 Post-Quantum Cryptography (PQC)
22.5 Quantum Cryptography and Its Applications
22.6 Corporate Competitions Towards Quantum Computing
22.7 Threats Posed to Critical Infrastructure and Mechanisms
22.8 Conclusion
References
23. Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term MemoryMadhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil Rawat, Shrikant Telang and Anjali Rawat
23.1 Introduction
23.1.1 Visual Question Answering
23.2 Literature Review
23.2.1 Attention within Sequences
23.2.2 Quantum Backdoor Attack Study
23.3 Problem Statement
23.4 Problem Elaboration
23.5 Proposed Methodology
23.6 Methods
23.6.1 Threat Model
23.6.2 Backdoor Design
23.6.3 The Optimized Patches and Recovery
23.6.4 Metrics Measures
23.7 Solution Approach
23.8 Expected Results
23.8.1 Explainable Recommendations System
23.8.2 VQA System
23.8.3 Quantum Security Aspect
23.9 Conclusion
23.10 Abbreviations
References
24. Quantum Cryptography – A Security ArchitectureSunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya Dabhade, Parikshit Bais and Ankita Singh
24.1 Introduction
24.1.1 Organisation
24.2 Related Work
24.3 Properties of Quantum Information
24.4 Methodology
24.5 Supported Explanation
24.6 Conclusion
References
25. Quantum Computing Anomalies in CommunicationAnushka Ayachit, Jahanvee Sharma, Bhupendra Panchal, Sunil Patil, Safdar Sardar Khan and Rijvan Beg
25.1 Introduction
25.2 Significance of Quantum Computing
25.2.1 Working of Quantum Computers
25.3 The Dark Side of Quantum Computing
25.4 Previous Works
25.5 Conclusion
References
26. Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative OverviewAnanya Upadhyay, Ruchir Namjoshi, Riya Jain, Jaideep Patel and Gayathri M.
26.1 Introduction
26.2 Related Work
26.3 Models for IDS
26.3.1 Classical Support Vector Machine Model
26.3.1.1 Classical Support Vector in IDS
26.3.1.2 Limitations of Classical SVM
26.3.2 Quantum SVM Model
26.3.2.1 Quantum Support Vector in IDS
26.4 Conclusion
References
27. Quantum Computing in Military Applications and OperationsAman Khubani, Anadi Sharma, Axith Choudhary, Om Shankar Bhatnagar and K. Chidambarathanu
27.1 Introduction
27.2 Literary Survey
27.3 Definition
27.3.1 Introduction
27.3.2 A Key Quantum Principle
27.3.2.1 Qubit
27.3.2.2 Qsup
27.3.2.3 Qent
27.3.2.4 Photon Polarization
27.3.2.5 Heisenberg’s Uncertainty Principle
27.3.2.6 Quantum Teleportation
27.3.3 QC
27.3.4 Quantum Internet
27.3.5 Quantum Sensing
27.4 Quantum Military Applications
27.5 Applications of QCRYP
27.6 Limitations
27.7 Conclusion
References
28. Quantum Cryptography Techniques: EvaluationShashank Sharma, T.M.Thiyagu, Om Kumar C.U. and D. Jeyakumar
28.1 Introduction
28.2 Quantum Technology (QTech) in Defence
28.2.1 Quantum Strategy
28.2.2 QTech Military Applications
28.3 The QKD Model
28.4 Related Work
28.5 Preliminaries
28.5.1 Quantum Information Properties
28.5.2 Quantum Communication System
28.6 QKD Protocols Implementation
28.6.1 Sifting
28.6.2 Error Correction
28.6.3 Privacy Amplifications
28.6.4 Authentication
28.7 Risk Analysis
28.8 Applications of Quantum Cryptography
28.9 Challenges of Quantum Cryptography
28.10 Conclusion and Future Work
References
29. Cyber Crime Attack Vulnerability Review for Quantum ComputingVaishnavi Gawde, Vanshika Goswami, Balwinder Kaur Dhaliwal, Sunil Parihar, Rupali Chaure and Mandakini Ingle
29.1 Introduction
29.1.1 Uses of QC
29.2 Significance of Cyber Crime Attack for QC
29.3 Related Work
29.4 Proposed Methodology
29.4.1 Threats Posed to Critical Infrastructure and Mechanisms
29.5 Conclusion
References
About the Editors
IndexBack to Top