Search

Browse Subject Areas

For Authors

Submit a Proposal

Quantum Computing in Cybersecurity

Edited by Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Jaideep Patel, and Vivek Bhardwaj
Copyright: 2024   |   Status: Published
ISBN: 9781394166336  |  Hardcover  |  
529 pages
Price: $225 USD
Add To Cart

One Line Description
This cutting-edge new volume provides a comprehensive exploration of emerging technologies and trends in quantum computing and how it is used in cybersecurity, covering everything from artificial intelligence to how quantum computing can be used to secure networks and prevent cyber crime.

Audience
IT specialists, engineers, software developers, government officials, political speakers, computer scientists, policymakers, academics, researchers, other industry professionals, and students

Description
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, could be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication.
Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second.

The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read peoples credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware.

This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.

Back to Top
Author / Editor Details
Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit.

Rajesh Kumar Chakrawarti, PhD, is a professor and the Dean of the Department of Computer Science & Engineering, Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of industry and academic experience and has published over 100 research papers and chapters in books.

Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University, Coordinator and Adjunct Professor, Utkal University, Bhubaneswar, India. He has over 23 years of academic experience and has authored textbooks, book chapters, and papers for journals and conferences. He has been a visiting doctoral fellow at the University of California, USA, and he has more than 30 patents to his credit.

Jaideep Patel, PhD, is a professor in the Computer Science and Engineering Department at the Sagar Institute of Research and Technology, Bhopal, India. He holds five patents, and has published two books and one book chapter.

Vivek Bhardwaj, PhD, is an assistant professor at Manipal University Jaipur, Jaipur, India. He has over eight years of teaching and research experience, has filed five patents, and has published many articles in scientific journals and conferences.

Back to Top

Table of Contents
Preface
1. Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data

Anil V. Turukmane and Ganesh Khekare
1.1 Introduction
1.2 Denial-of-Service Attacks
1.2.1 DoS Attacks in Real Life
1.3 Related Work
1.3.1 Probabilistic Packet Marking (PPM)
1.3.1.1 DoS Attacks
1.3.1.2 FDPM
1.3.1.3 Simulation Surroundings via Extending ns2
1.4 Proposed Methodology
1.4.1 Denial of Service
1.4.1.1 Direct DDoS Attacks
1.4.1.2 Distributed DDoS Attacks
1.4.1.3 Reflector DDoS Attacks
1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking
1.5.1 A Brief Review of the Packet Marking Procedure
1.5.2 Packet Marking
1.5.3 Path Selection
1.5.4 Packet Sending
1.5.5 Packet Marking and Logging
1.5.6 Path Reconstruction
1.6 Conclusion
References
2. Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography
Ambika N.
2.1 Introduction
2.2 Properties of Quantum Computing
2.3 Applications of Quantum Computing
2.4 Background
2.5 Literature Survey
2.6 Proposed Work
2.7 Analysis of the Study
2.8 Conclusion
References
3. DDoS Attack and Defense Mechanism in a Server
Pranav Bhatnagar, Shreya Pai and Minhaj Khan
3.1 Introduction
3.2 DoS Attack
3.3 DDoS Attack
3.4 DDoS Mitigation
3.5 Conclusion
Acknowledgement
References
4. Dark Web Content Classification Using Quantum Encoding
Ashwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud
4.1 Introduction
4.2 Related Work
4.3 Proposed Approach
4.4 Result and Discussion
4.5 Conclusion
References
5. Secure E-Voting Scheme Using Blockchain
Shrimoyee Banerjee and Umesh Bodkhe
5.1 Introduction
5.1.1 General Introduction
5.1.1.1 Key Components of the Blockchain Architecture
5.1.1.2 Characteristics of Blockchain Architecture
5.1.2 Electronic Voting System Using Quantum Blockchain
5.1.3 Architecture
5.1.4 Objective
5.1.5 Problem Statement
5.2 Literature Survey
5.2.1 Overview
5.3 Implementation and Methodology
5.3.1 Description
5.3.2 Installing Dependencies
5.3.3 Running
5.4 Result Analysis & Output
5.5 Conclusion and Future Directions
References
6. An Overview of Quantum Computing–Based Hidden Markov Models
B. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal
6.1 Introduction
6.2 Elaboration of Hidden Quantum Markov Model
6.3 Example of HQMMs (Isolated Word Recognition in Action)
6.4 Matching of State Observation Density
6.5 Conclusion and Results
References
7. Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives
Tejashwa Agarwal and Amit Kumar Tyagi
7.1 Introduction to OS, AI and ML
7.1.1 A Brief Summary
7.1.2 Different Components of AI Integrated with the OS
7.2 Learning Configurations
7.3 Building ML Models
7.4 Work Done in Improving Process Scheduling
7.4.1 OS Agents
7.5 Artificial Intelligence in Distributed Operating Systems
7.6 Current Progress
7.6.1 Advantages
7.6.2 Concerns
7.7 Quantum Artificial Intelligence
7.8 Conclusion
References
8. Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act
Hepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu
8.1 Introduction
8.1.1 Techno-Globalism
8.1.2 National Security Act
8.1.2.1 Conditions when NSA can be Evoked
8.1.2.2 Safeguarding People Against the Act
8.1.2.3 Misuse of NSA
8.1.2.4 Need for Review
8.1.2.5 Critical Infrastructure and the Need of National Security Act’s Reformation
8.1.3 Techno-Nationalism
8.1.3.1 Rise of Techno-Nationalism
8.1.3.2 The Rise of Industrial Policy Revolution
8.1.3.3 Human Capital as a Strategic Asset
8.1.3.4 Academic Institutions Being the New Ground Zero
8.1.3.5 Decoupling of the Knowledge Networks
8.1.3.6 Rise of China’s Techno-Nationalism
8.1.3.7 China’s Achievement so far in Collaboration with Taiwan
8.1.3.8 Techno-Nationalism: The Issue of Cyber Vulnerability won’t be Resolved
8.2 Conclusion
Acknowledgement
References
9. Quantum Computing Based on Cybersecurity
P. William, Vivek Parganiha and D.B. Pardeshi
9.1 Introduction
9.2 Preliminaries
9.3 Threat Landscape
9.4 Defensive Measurements, Countermeasures, and Best Practises
9.5 Conclusion
References
10. Quantum Cryptography for the Future Internet and the Security Analysis
P. William, A.B. Pawar and M.A. Jawale
10.1 Introduction
10.2 Related Works
10.3 Preliminaries
10.3.1 Properties of Quantum Information
10.3.2 Quantum Communication System
10.4 Quantum Cryptography for Future Internet
10.4.1 Unconditional Security
10.4.2 Sniffing Detection
10.4.3 Security of the QKD
10.5 Conclusion
References
11. Security Aspects of Quantum Cryptography
P. William, Siddhartha Choubey and Abha Choubey
11.1 Introduction
11.2 Literature Survey
11.3 Quantum Key Distribution
11.4 Cryptography
11.5 Quantum Cryptography with Faint Laser Pulses
11.6 Eavesdropping
11.7 Conclusion
References
12. Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses
P. William, Vivek Parganiha and D.B. Pardeshi
12.1 Introduction
12.2 Quantum Computing Basics
12.2.1 Qubits, Quantum Gates & Measurements
12.2.2 Quantum Noise
12.2.3 Quantum Neural Networks (QNN)
12.3 Security Applications
12.3.1 PCB Defect Classification
12.3.2 Hardware Trojan & Recycled Chip Detection
12.3.3 Usage Model of QML in Hardware Security
12.4 Quantum Machine Learning
12.4.1 Assets and Vulnerabilities
12.4.2 Attack Models and Defenses Unreliable Hardware Allocator
12.5 Conclusion
References
13. Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future
Nirav Bhatt and Amit Kumar Tyagi
13.1 Introduction
13.2 Background
13.3 Scope of this Work
13.4 Methodology and Analysis of Simulation Results
13.5 Quantum-Based Cybersecurity and Forensics
13.5.1 Quantum-Based Cybersecurity
13.5.2 Quantum-Based Forensics
13.6 Conclusion and Future Works
References
14. Quantum Computing: A Software Engineering Approach
Mradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma
14.1 Introduction
14.2 Background of Research Area
14.3 Why Cryptography?
14.3.1 Application-to-Application Communication Reference
14.3.2 Modes of Block Cyphers
14.3.3 Secret Key Cryptography Algorithms in Use Today
14.4 Classical Cryptography
14.5 Quantum Cryptography (QCr)
14.6 Quantum Key Distribution
14.6.1 Application (Key-Related Work)
14.6.2 Problem Statement
14.7 Cryptanalysis
14.8 Entanglement
14.9 Quantum Teleportation
14.10 Applications of QCr in Cybersecurity
14.11 Quantum Key Distribution Protocols Implementation
14.12 Research and Work
14.13 Challenges Faced by QC
14.14 Limitations
14.15 Conclusion
References
15. Quantum Computing to the Advantage of Neural Network
Aditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat
15.1 Introduction
15.2 Significance of Quantum Computers in Machine Learning
15.3 Related Work
15.4 Proposed Methodology
15.5 Result and Analysis
15.6 Conclusion
Glossary
References
16. Image Filtering Based on VQA with Quantum Security
Avni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan
16.1 Introduction
16.2 Related Work
16.3 Problem Statement
16.4 Working
16.5 Proposed Methodology Solution
16.6 Result Analysis
16.7 Conclusion
References
17. Quantum Computing Techniques Assessment and Representation
Dewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om Kumar C.U. and D. Jeyakumar
17.1 Introduction
17.1.1 History of Computing
17.1.2 Innovative Ways of Computing
17.1.3 Need for QComp
17.2 Fundamentals of QC
17.3 Properties of QC
17.3.1 Behaviour
17.3.2 Superposition
17.3.3 Entanglement
17.3.4 Interference
17.4 Topography of QC
17.5 The Architecture of QC
17.5.1 Hardware and Software of QCOMP
17.6 Quantum Algorithm
17.7 Design Limitations of Quantum Computer
17.8 Different Categories of Quantum Computer
17.8.1 Analog Quantum Computer
17.8.2 NISQ Gate-Based Computer
17.8.3 Gate-Based Quantum Computer with Full Error Correction
17.9 Advantages of QC
17.10 Disadvantages of QC
17.11 Applications of QC
17.12 Major Challenges in QC
17.13 Conclusion
References
18. Quantum Computing Technological Design Along with Its Dark Side
Divyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat and Anjali Rawat
18.1 Introduction
18.2 Related Work
18.3 History and Evolution of QCOM
18.4 Components & Concepts that Make QCOM Possible
18.5 Plans for the Future Development of Quantum Computer
18.6 Dark Side of QCOM
18.7 Plans for Protection in Quantum Era
18.8 Conclusion
References
19. Quantum Technology for Military Applications
Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat and Kiran Pachlasiya
19.1 Introduction
19.2 Related Work
19.3 Overview of QTECH
19.3.1 Quantum Information Science
19.3.2 Qcomm
19.3.2.1 Quantum Simulations
19.3.2.2 Quantum Searching and Quantum Walks
19.3.2.3 Quantum Cryptoanalysis
19.3.2.4 Quantum Linear Algebra
19.3.2.5 Quantum Optimisations
19.3.3 Quantum Communication and Cryptography
19.3.3.1 Post-Quantum Cryptography
19.3.3.2 Quantum Random Number Generator
19.3.3.3 Quantum Network
19.3.3.4 Quantum Key Distribution
19.3.4 Quantum Sensing and Metrology
19.3.4.1 Quantum Clocks
19.3.4.2 Quantum RF Antenna
19.3.4.3 Quantum Radar Technology
19.3.4.4 Quantum Electric, Magnetic and Inertial Forces Sensing
19.3.4.5 Quantum Imaging Systems
19.3.4.6 Other Sensors and Technology
19.4 QTECH in Defence
19.4.1 TRL and Time Horizon
19.4.2 QTech Countermeasures
19.4.3 Quantum Strategy
19.5 Military Applications of QTECH
19.5.1 Capabilities of Qcomm
19.5.2 Quantum Cybersecurity
19.5.3 Quantum PNT
19.5.4 Quantum Communication Network
19.5.5 Quantum Electronic Warfare
19.5.6 Quantum ISTAR
19.5.7 Chemical and Biological Simulations and Detection
19.5.8 New Material Design
19.5.9 Quantum Radar and Lidar
19.5.10 Quantum Space Warfare
19.5.11 Quantum Underwater Warfare
19.6 Challenges and Consequences of Quantum Warfare
19.6.1 Technical Repercussions and Difficulties
19.6.2 Challenges and Consequences for Ethics and Peace
19.6.3 Consequences and Challenges for Military
19.7 Conclusion
References
20. Potential Threats and Ethical Risks of Quantum Computing
Apurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar, Shrikant Telang and Anjali Rawat
20.1 Introduction
20.1.1 Knowledge of Quantum Computing
20.1.2 Limitations of Quantum Computing
20.1.3 Quantum Computer vs. Classical Computer
20.1.4 Diving Deep into Quantum Computers
20.1.5 Three Potential Ethical Issues Associated with Quantum Computing
20.1.6 Sensitive Data in the Open
20.2 Research Design & Methodology
20.2.1 Research Objectives
20.2.2 Primary Studies Selection
20.3 Brief In-Depth Overview of Possible Vulnerabilities
20.3.1 Quantum Technology’s Risk to Cybersecurity
20.3.1.1 How may Cybersecurity be Improved by Using Quantum Computing?
20.3.1.2 Risks Associated with Quantum Computers
20.3.1.3 What is the Most Pressing Cybersecurity Issue that Executives
are Presently Facing?
20.3.1.4 What Potential Risks Could Quantum Computing Pose?
20.3.1.5 Hacking Quantum Computers is Not Possible
20.3.1.6 Do Any Quantum Computers Exist now that are Available for Purchase?
20.3.2 Ethical Conditions and Risks
20.3.3 Protect Yourselves Against these Threats
20.3.3.1 Implement Industry Security Guidelines
20.3.3.2 Establish Zero Trust
20.3.3.3 Automated Tools Deployment
20.3.3.4 Put Controlled Threat Detection into Practice
20.3.4 Potential Threats and Existing Risks
20.3.4.1 Cybersecurity
20.3.4.2 Access
20.3.4.3 Artificial Intelligence, Data Harvesting, and Privacy
20.3.4.4 Explainability
20.3.4.5 Global Tensions and the Quantum “Arms Race”
20.4 New Risks to be Created
20.4.1 Health Care and Life Sciences
20.4.2 Emerging Materials
20.5 Futuristic Picture of Quantum Ethics
20.5.1 Quantum Computing is Coming of Age
20.6 Conclusion
References
21. Is Quantum Computing a Cybersecurity Threat?
Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish Chourey
21.1 Introduction
21.1.1 Need for Cybersecurity
21.1.2 What is Quantum Computing?
21.1.3 What is Cryptography?
21.1.4 Symmetric Cryptography
21.1.5 Asymmetric Cryptography
21.1.6 Classical and Quantum Cryptography
21.1.7 Quantum Computing’s Effects on Existing Cryptography
21.1.8 Cryptography Does Not Mean Security
21.2 How QCom Threatens Cybersecurity
21.3 How QCom could Improve Cybersecurity
21.4 Quantum Cryptography and Its Applications
21.5 Proposed Methodology
21.5.1 The Threat of Quantum to Cybersecurity
21.5.2 QCom
21.5.3 QCom Challenge
21.6 Background/Objective
21.7 Conclusion
References
22. Quantum Computing in Data Security: A Critical Assessment
Sadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun Jhapate and Divyani Joshi
22.1 Introduction
22.2 Present Cryptographic Algorithms and Systems
22.3 Comparing Traditional Computing and Quantum Computing
22.4 Post-Quantum Cryptography (PQC)
22.5 Quantum Cryptography and Its Applications
22.6 Corporate Competitions Towards Quantum Computing
22.7 Threats Posed to Critical Infrastructure and Mechanisms
22.8 Conclusion
References
23. Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory
Madhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil Rawat, Shrikant Telang and Anjali Rawat
23.1 Introduction
23.1.1 Visual Question Answering
23.2 Literature Review
23.2.1 Attention within Sequences
23.2.2 Quantum Backdoor Attack Study
23.3 Problem Statement
23.4 Problem Elaboration
23.5 Proposed Methodology
23.6 Methods
23.6.1 Threat Model
23.6.2 Backdoor Design
23.6.3 The Optimized Patches and Recovery
23.6.4 Metrics Measures
23.7 Solution Approach
23.8 Expected Results
23.8.1 Explainable Recommendations System
23.8.2 VQA System
23.8.3 Quantum Security Aspect
23.9 Conclusion
23.10 Abbreviations
References
24. Quantum Cryptography – A Security Architecture
Sunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya Dabhade, Parikshit Bais and Ankita Singh
24.1 Introduction
24.1.1 Organisation
24.2 Related Work
24.3 Properties of Quantum Information
24.4 Methodology
24.5 Supported Explanation
24.6 Conclusion
References
25. Quantum Computing Anomalies in Communication
Anushka Ayachit, Jahanvee Sharma, Bhupendra Panchal, Sunil Patil, Safdar Sardar Khan and Rijvan Beg
25.1 Introduction
25.2 Significance of Quantum Computing
25.2.1 Working of Quantum Computers
25.3 The Dark Side of Quantum Computing
25.4 Previous Works
25.5 Conclusion
References
26. Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview
Ananya Upadhyay, Ruchir Namjoshi, Riya Jain, Jaideep Patel and Gayathri M.
26.1 Introduction
26.2 Related Work
26.3 Models for IDS
26.3.1 Classical Support Vector Machine Model
26.3.1.1 Classical Support Vector in IDS
26.3.1.2 Limitations of Classical SVM
26.3.2 Quantum SVM Model
26.3.2.1 Quantum Support Vector in IDS
26.4 Conclusion
References
27. Quantum Computing in Military Applications and Operations
Aman Khubani, Anadi Sharma, Axith Choudhary, Om Shankar Bhatnagar and K. Chidambarathanu
27.1 Introduction
27.2 Literary Survey
27.3 Definition
27.3.1 Introduction
27.3.2 A Key Quantum Principle
27.3.2.1 Qubit
27.3.2.2 Qsup
27.3.2.3 Qent
27.3.2.4 Photon Polarization
27.3.2.5 Heisenberg’s Uncertainty Principle
27.3.2.6 Quantum Teleportation
27.3.3 QC
27.3.4 Quantum Internet
27.3.5 Quantum Sensing
27.4 Quantum Military Applications
27.5 Applications of QCRYP
27.6 Limitations
27.7 Conclusion
References
28. Quantum Cryptography Techniques: Evaluation
Shashank Sharma, T.M.Thiyagu, Om Kumar C.U. and D. Jeyakumar
28.1 Introduction
28.2 Quantum Technology (QTech) in Defence
28.2.1 Quantum Strategy
28.2.2 QTech Military Applications
28.3 The QKD Model
28.4 Related Work
28.5 Preliminaries
28.5.1 Quantum Information Properties
28.5.2 Quantum Communication System
28.6 QKD Protocols Implementation
28.6.1 Sifting
28.6.2 Error Correction
28.6.3 Privacy Amplifications
28.6.4 Authentication
28.7 Risk Analysis
28.8 Applications of Quantum Cryptography
28.9 Challenges of Quantum Cryptography
28.10 Conclusion and Future Work
References
29. Cyber Crime Attack Vulnerability Review for Quantum Computing
Vaishnavi Gawde, Vanshika Goswami, Balwinder Kaur Dhaliwal, Sunil Parihar, Rupali Chaure and Mandakini Ingle
29.1 Introduction
29.1.1 Uses of QC
29.2 Significance of Cyber Crime Attack for QC
29.3 Related Work
29.4 Proposed Methodology
29.4.1 Threats Posed to Critical Infrastructure and Mechanisms
29.5 Conclusion
References
About the Editors
Index


Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page