Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication.
Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second.
The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware.
This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.
Author(s): Romil Rawat, Rajesh Kumar, Chakrawarti Sanjaya, Kumar Sarangi, Jaideep Patel, Vivek Bhardwaj, Anjali Rawat, Hitesh Rawat
Publisher: Wiley
Year: 2021
Language: English
Pages: 534
Cover
Table of Contents
Series Page
Title Page
Copyright Page
Preface
1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data
1.1 Introduction
1.2 Denial-of-Service Attacks
1.3 Related Work
1.4 Proposed Methodology
1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking
1.6 Conclusion
References
2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography
2.1 Introduction
2.2 Properties of Quantum Computing
2.3 Applications of Quantum Computing
2.4 Background
2.5 Literature Survey
2.6 Proposed Work
2.7 Analysis of the Study
2.8 Conclusion
References
3 DDoS Attack and Defense Mechanism in a Server
3.1 Introduction
3.2 DoS Attack
3.3 DDoS Attack
3.4 DDoS Mitigation
3.5 Conclusion
Acknowledgement
References
4 Dark Web Content Classification Using Quantum Encoding
4.1 Introduction
4.2 Related Work
4.3 Proposed Approach
4.4 Result and Discussion
4.5 Conclusion
References
5 Secure E-Voting Scheme Using Blockchain
5.1 Introduction
5.2 Literature Survey
5.3 Implementation and Methodology
5.4 Result Analysis & Output
5.5 Conclusion and Future Directions
References
6 An Overview of Quantum Computing–Based Hidden Markov Models
6.1 Introduction
6.2 Elaboration of Hidden Quantum Markov Model
6.3 Example of HQMMs (Isolated Word Recognition in Action)
6.4 Matching of State Observation Density
6.5 Conclusion and Results
References
7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives
7.1 Introduction to OS, AI and ML
7.2 Learning Configurations
7.3 Building ML Models
7.4 Work Done in Improving Process Scheduling
7.5 Artificial Intelligence in Distributed Operating Systems
7.6 Current Progress
7.7 Quantum Artificial Intelligence
7.8 Conclusion
References
8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act
8.1 Introduction
8.2 Conclusion
Acknowledgement
References
9 Quantum Computing Based on Cybersecurity
9.1 Introduction
9.2 Preliminaries
9.3 Threat Landscape
9.4 Defensive Measurements, Countermeasures, and Best Practises
9.5 Conclusion
References
10 Quantum Cryptography for the Future Internet and the Security Analysis
10.1 Introduction
10.2 Related Works
10.3 Preliminaries
10.4 Quantum Cryptography for Future Internet
10.5 Conclusion
References
11 Security Aspects of Quantum Cryptography
11.1 Introduction
11.2 Literature Survey
11.3 Quantum Key Distribution
11.4 Cryptography
11.5 Quantum Cryptography with Faint Laser Pulses
11.6 Eavesdropping
11.7 Conclusion
References
12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses
12.1 Introduction
12.2 Quantum Computing Basics
12.3 Security Applications
12.4 Quantum Machine Learning
12.5 Conclusion
References
13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future
13.1 Introduction
13.2 Background
13.3 Scope of this Work
13.4 Methodology and Analysis of Simulation Results
13.5 Quantum-Based Cybersecurity and Forensics
13.6 Conclusion and Future Works
References
14 Quantum Computing: A Software Engineering Approach
14.1 Introduction
14.2 Background of Research Area
14.3 Why Cryptography?
14.4 Classical Cryptography
14.5 Quantum Cryptography (QCr)
14.6 Quantum Key Distribution
14.7 Cryptanalysis
14.8 Entanglement
14.9 Quantum Teleportation
14.10 Applications of QCr in Cybersecurity
14.11 Quantum Key Distribution Protocols Implementation
14.12 Research and Work
14.13 Challenges Faced by QC
14.14 Limitations
14.15 Conclusion
References
15 Quantum Computing to the Advantage of Neural Network
15.1 Introduction
15.2 Significance of Quantum Computers in Machine Learning
15.3 Related Work
15.4 Proposed Methodology
15.5 Result and Analysis
15.6 Conclusion
Glossary
References
16 Image Filtering Based on VQA with Quantum Security
16.1 Introduction
16.2 Related Work
16.3 Problem Statement
16.4 Working
16.5 Proposed Methodology Solution
16.6 Result Analysis
16.7 Conclusion
References
17 Quantum Computing Techniques Assessment and Representation
17.1 Introduction
17.2 Fundamentals of QC
17.3 Properties of QC
17.4 Topography of QC
17.5 The Architecture of QC
17.6 Quantum Algorithm
17.7 Design Limitations of Quantum Computer
17.8 Different Categories of Quantum Computer
17.9 Advantages of QC
17.10 Disadvantages of QC
17.11 Applications of QC
17.12 Major Challenges in QC
17.13 Conclusion
References
18 Quantum Computing Technological Design Along with Its Dark Side
18.1 Introduction
18.2 Related Work
18.3 History and Evolution of QCOM
18.4 Components & Concepts that Make QCOM Possible
18.5 Plans for the Future Development of Quantum Computer
18.6 Dark Side of QCOM
18.7 Plans for Protection in Quantum Era
18.8 Conclusion
References
19 Quantum Technology for Military Applications
19.1 Introduction
19.2 Related Work
19.3 Overview of QTECH
19.4 QTECH in Defence
19.5 Military Applications of QTECH
19.6 Challenges and Consequences of Quantum Warfare
19.7 Conclusion
References
20 Potential Threats and Ethical Risks of Quantum Computing
20.1 Introduction
20.2 Research Design & Methodology
20.3 Brief In-Depth Overview of Possible Vulnerabilities
20.4 New Risks to be Created
20.5 Futuristic Picture of Quantum Ethics
20.6 Conclusion
References
21 Is Quantum Computing a Cybersecurity Threat?
21.1 Introduction
21.2 How QCom Threatens Cybersecurity
21.3 How QCom could Improve Cybersecurity
21.4 Quantum Cryptography and Its Applications
21.5 Proposed Methodology
21.6 Background/Objective
21.7 Conclusion
References
22 Quantum Computing in Data Security: A Critical Assessment
22.1 Introduction
22.2 Present Cryptographic Algorithms and Systems
22.3 Comparing Traditional Computing and Quantum Computing
22.4 Post-Quantum Cryptography (PQC)
22.5 Quantum Cryptography and Its Applications
22.6 Corporate Competitions Towards Quantum Computing
22.7 Threats Posed to Critical Infrastructure and Mechanisms
22.8 Conclusion
References
23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory
23.1 Introduction
23.2 Literature Review
23.3 Problem Statement
23.4 Problem Elaboration
23.5 Proposed Methodology
23.6 Methods
23.7 Solution Approach
23.8 Expected Results
23.9 Conclusion
23.10 Abbreviations
References
24 Quantum Cryptography – A Security Architecture
24.1 Introduction
24.2 Related Work
24.3 Properties of Quantum Information
24.4 Methodology
24.5 Supported Explanation
24.6 Conclusion
References
25 Quantum Computing Anomalies in Communication
25.1 Introduction
25.2 Significance of Quantum Computing
25.3 The Dark Side of Quantum Computing
25.4 Previous Works
25.5 Conclusion
References
26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview
26.1 Introduction
26.2 Related Work
26.3 Models for IDS
26.4 Conclusion
References
27 Quantum Computing in Military Applications and Operations
27.1 Introduction
27.2 Literary Survey
27.3 Definition
27.4 Quantum Military Applications
27.5 Applications of QCRYP
27.6 Limitations
27.7 Conclusion
References
28 Quantum Cryptography Techniques: Evaluation
28.1 Introduction
28.2 Quantum Technology (QTech) in Defence
28.3 The QKD Model
28.4 Related Work
28.5 Preliminaries
28.6 QKD Protocols Implementation
28.7 Risk Analysis
28.8 Applications of Quantum Cryptography
28.9 Challenges of Quantum Cryptography
28.10 Conclusion and Future Work
References
29 Cyber Crime Attack Vulnerability Review for Quantum Computing
29.1 Introduction
29.2 Significance of Cyber Crime Attack for QC
29.3 Related Work
29.4 Proposed Methodology
29.5 Conclusion
References
About the Editors
Index
Also of Interest
End User License Agreement