Название: Holistic Approach to Quantum Cryptography in Cyber Security Автор: Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi Издательство: CRC Press Год: 2023 Страниц: 257 Язык: английский Формат: pdf (true), epub (true) Размер: 25.8 MB
This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume.
It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques’ architectures and design, cyber security techniques management, software-defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography.
Quantum cryptography utilizes the subtle properties of quantum mechanics, for example, the quantum no-cloning hypothesis and the Heisenberg uncertainty principle. In contrast to conventional cryptography, whose security is regularly based on unproven computational assumptions, quantum cryptography has a significant advantage in that its security is frequently based on the laws of physics. Thus far, the proposed applications of quantum cryptography include quantum key distribution (QKD) and quantum bit commitment.
Many of us are already using wireless sensor devices in our day-to-day life, but security in those devices or applications using those devices is very important. Comprehensive analysis of practical quantum cryptography systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels is also observed. Quantum secret sharing is one of the important parts of quantum cryptography.
Apart from these, security and privacy are vital to modern blockchain technology since they can exist without an authorized third party, which means that there may not be a trusted responsible person or organization in charge of systems. Security of the current systems is based on computational hardness assumptions, and many of the standard cryptography systems are known to be vulnerable to the advent of full-fledged quantum computers. On the other hand, it is possible to make a blockchain more secure by quantum information technology. So these are some of the main reasons for writing about quantum cryptography and its applications.
The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, Computer Science, and information technology.
Contents: Preface Chapter 1 Toward Security in Software-Defined Networks with Trust and Monitoring Chapter 2 Quantum Key Generation and Distribution Using Decoy State Chapter 3 Cyber Security Techniques, Architectures, and Design Chapter 4 Secured Unmanned Aerial Vehicle-based Fog Computing Network: A Review Chapter 5 Mars Surface Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype Chapter 6 Quantum-Safe Asymmetric Cryptosystems: Current Solutions and Future Directions against Quantum Attacks Chapter 7 Cyber Security Technique for Internet of Things Using Machine Learning Chapter 8 Image Encryption and Decryption through Quantum Cryptography Chapter 9 Cyber Security Techniques Management Chapter 10 Quantum Cryptography and Quantum Key Distribution Chapter 11 Quantum Cryptography: Basics, Effects on Communication, and Data Management Chapter 12 Quantum Number: Error Correction Circuits and Methods Chapter 13 Risk Analysis Assessment of Interdependency of Vulnerabilities: In Cyber-Physical Systems Index
Скачать Holistic Approach to Quantum Cryptography in Cyber Security
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.