Quantum computing in cybersecurity / edited by Romil Rawat... [and 6 others].

Contributor(s): Rawat, Romil [editor.]
Language: English Publisher: Hoboken, NJ : Beverly, MA : John Wiley & Sons, Inc. ; Scrivener Publishing LLC, 2023Copyright date: ©2023Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781394166336; 9781394167401; 1394167407; 1394167385; 9781394167388Subject(s): Computer security | Computer securityGenre/Form: Electronic books.DDC classification: 005.80285 LOC classification: QA76.9.A25 | Q83 2023Online resources: Full text is available at Wiley Online Library Click here to view
Contents:
Intro -- Table of Contents -- Series Page -- Title Page -- Copyright Page -- Preface -- 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data -- 1.1 Introduction -- 1.2 Denial-of-Service Attacks -- 1.3 Related Work -- 1.4 Proposed Methodology -- 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking -- 1.6 Conclusion -- References -- 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography -- 2.1 Introduction -- 2.2 Properties of Quantum Computing -- 2.3 Applications of Quantum Computing -- 2.4 Background -- 2.5 Literature Survey -- 2.6 Proposed Work -- 2.7 Analysis of the Study -- 2.8 Conclusion -- References -- 3 DDoS Attack and Defense Mechanism in a Server -- 3.1 Introduction -- 3.2 DoS Attack -- 3.3 DDoS Attack -- 3.4 DDoS Mitigation -- 3.5 Conclusion -- Acknowledgement -- References -- 4 Dark Web Content Classification Using Quantum Encoding -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Proposed Approach -- 4.4 Result and Discussion -- 4.5 Conclusion -- References -- 5 Secure E-Voting Scheme Using Blockchain -- 5.1 Introduction -- 5.2 Literature Survey -- 5.3 Implementation and Methodology -- 5.4 Result Analysis &amp -- Output -- 5.5 Conclusion and Future Directions -- References -- 6 An Overview of Quantum Computingâ€"Based Hidden Markov Models -- 6.1 Introduction -- 6.2 Elaboration of Hidden Quantum Markov Model -- 6.3 Example of HQMMs (Isolated Word Recognition in Action) -- 6.4 Matching of State Observation Density -- 6.5 Conclusion and Results -- References -- 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives -- 7.1 Introduction to OS, AI and ML -- 7.2 Learning Configurations -- 7.3 Building ML Models -- 7.4 Work Done in Improving Process Scheduling.
Table of Contents Preface xix 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data 1 Anil V. Turukmane and Ganesh Khekare 1.1 Introduction 2 1.2 Denial-of-Service Attacks 3 1.3 Related Work 5 1.4 Proposed Methodology 8 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking 10 1.6 Conclusion 13 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography 17 Ambika N. 2.1 Introduction 18 2.2 Properties of Quantum Computing 19 2.3 Applications of Quantum Computing 22 2.4 Background 24 2.5 Literature Survey 25 2.6 Proposed Work 26 2.7 Analysis of the Study 27 2.8 Conclusion 29 3 DDoS Attack and Defense Mechanism in a Server 33 Pranav Bhatnagar, Shreya Pai and Minhaj Khan 3.1 Introduction 34 3.2 DoS Attack 37 3.3 DDoS Attack 39 3.4 DDoS Mitigation 51 3.5 Conclusion 54 4 Dark Web Content Classification Using Quantum Encoding 57 Ashwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud 4.1 Introduction 58 4.2 Related Work 61 4.3 Proposed Approach 65 4.4 Result and Discussion 70 4.5 Conclusion 76 5 Secure E-Voting Scheme Using Blockchain 81 Shrimoyee Banerjee and Umesh Bodkhe 5.1 Introduction 82 5.2 Literature Survey 87 5.3 Implementation and Methodology 89 5.4 Result Analysis & Output 100 5.5 Conclusion and Future Directions 102 6 An Overview of Quantum Computing--Based Hidden Markov Models 105 B. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal 6.1 Introduction 105 6.2 Elaboration of Hidden Quantum Markov Model 107 6.3 Example of HQMMs (Isolated Word Recognition in Action) 115 6.4 Matching of State Observation Density 117 6.5 Conclusion and Results 118 7 Artificial Intelligence and Qubit--Based Operating Systems: Current Progress and Future Perspectives 121 Tejashwa Agarwal and Amit Kumar Tyagi 7.1 Introduction to OS, AI and ML 122 7.2 Learning Configurations 123 7.3 Building ML Models 124 7.4 Work Done in Improving Process Scheduling 124 7.5 Artificial Intelligence in Distributed Operating Systems 128 7.6 Current Progress 129 7.7 Quantum Artificial Intelligence 133 7.8 Conclusion 135 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act 137 Hepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu 8.1 Introduction 138 8.2 Conclusion 161 9 Quantum Computing Based on Cybersecurity 165 P. William, Vivek Parganiha and D.B. Pardeshi 9.1 Introduction 166 9.2 Preliminaries 166 9.3 Threat Landscape 168 9.4 Defensive Measurements, Countermeasures, and Best Practises 170 9.5 Conclusion 171 10 Quantum Cryptography for the Future Internet and the Security Analysis 175 P. William, A.B. Pawar and M.A. Jawale 10.1 Introduction 175 10.2 Related Works 177 10.3 Preliminaries 178 10.4 Quantum Cryptography for Future Internet 180 10.5 Conclusion 185 11 Security Aspects of Quantum Cryptography 189 P. William, Siddhartha Choubey and Abha Choubey 11.1 Introduction 189 11.2 Literature Survey 190 11.3 Quantum Key Distribution 192 11.4 Cryptography 193 11.5 Quantum Cryptography with Faint Laser Pulses 195 11.6 Eavesdropping 196 11.7 Conclusion 198 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses 201 P. William, Vivek Parganiha and D.B. Pardeshi 12.1 Introduction 201 12.2 Quantum Computing Basics 202 12.3 Security Applications 206 12.4 Quantum Machine Learning 210 12.5 Conclusion 213 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future 217 Nirav Bhatt and Amit Kumar Tyagi 13.1 Introduction 218 13.2 Background 219 13.3 Scope of this Work 220 13.4 Methodology and Analysis of Simulation Results 222 13.5 Quantum-Based Cybersecurity and Forensics 228 13.6 Conclusion and Future Works 230 14 Quantum Computing: A Software Engineering Approach 233 Mradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma 14.1 Introduction 234 14.2 Background of Research Area 235 14.3 Why Cryptography? 235 14.4 Classical Cryptography 238 14.5 Quantum Cryptography (QCr) 239 14.6 Quantum Key Distribution 240 14.7 Cryptanalysis 242 14.8 Entanglement 242 14.9 Quantum Teleportation 243 14.10 Applications of QCr in Cybersecurity 243 14.11 Quantum Key Distribution Protocols Implementation 244 14.12 Research and Work 244 14.13 Challenges Faced by QC 245 14.14 Limitations 245 14.15 Conclusion 246 15 Quantum Computing to the Advantage of Neural Network 249 Aditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat 15.1 Introduction 250 15.2 Significance of Quantum Computers in Machine Learning 251 15.3 Related Work 252 15.4 Proposed Methodology 255 15.5 Result and Analysis 258 15.6 Conclusion 258 16 Image Filtering Based on VQA with Quantum Security 263 Avni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan 16.1 Introduction 263 16.2 Related Work 267 16.3 Problem Statement 269 16.4 Working 269 16.5 Proposed Methodology Solution 270 16.6 Result Analysis 272 16.7 Conclusion 272 17 Quantum Computing Techniques Assessment and Representation 275 Dewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om Kumar C.U. and D. Jeyakumar 17.1 Introduction 276 17.2 Fundamentals of QC 278 17.3 Properties of QC 278 17.4 Topography of QC 280 17.5 The Architecture of QC 281 17.6 Quantum Algorithm 283 17.7 Design Limitations of Quantum Computer 284 17.8 Different Categories of Quantum Computer 286 17.9 Advantages of QC 287 17.10 Disadvantages of QC 287 17.11 Applications of QC 288 17.12 Major Challenges in QC 290 17.13 Conclusion 291 18 Quantum Computing Technological Design Along with Its Dark Side 295 Divyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat and Anjali Rawat 18.1 Introduction 296 18.2 Related Work 297 18.3 History and Evolution of QCOM 298 18.4 Components & Concepts that Make QCOM Possible 300 18.5 Plans for the Future Development of Quantum Computer 302 18.6 Dark Side of QCOM 306 18.7 Plans for Protection in Quantum Era 309 18.8 Conclusion 310 19 Quantum Technology for Military Applications 313 Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat and Kiran Pachlasiya 19.1 Introduction 314 19.2 Related Work 317 19.3 Overview of QTECH 318 19.4 QTECH in Defence 325 19.5 Military Applications of QTECH 327 19.6 Challenges and Consequences of Quantum Warfare 331 19.7 Conclusion 332 20 Potential Threats and Ethical Risks of Quantum Computing 335 Apurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar, Shrikant Telang and Anjali Rawat 20.1 Introduction 335 20.2 Research Design & Methodology 339 20.3 Brief In-Depth Overview of Possible Vulnerabilities 341 20.4 New Risks to be Created 349 20.5 Futuristic Picture of Quantum Ethics 350 20.6 Conclusion 352 21 Is Quantum Computing a Cybersecurity Threat? 353 Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish Chourey 21.1 Introduction 354 21.2 How QCom Threatens Cybersecurity 360 21.3 How QCom could Improve Cybersecurity 361 21.4 Quantum Cryptography and Its Applications 362 21.5 Proposed Methodology 363 21.6 Background/Objective 366 21.7 Conclusion 366 References 367 22 Quantum Computing in Data Security: A Critical Assessment 369 Sadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun Jhapate and Divyani Joshi 22.1 Introduction 370 22.2 Present Cryptographic Algorithms and Systems 371 22.3 Comparing Traditional Computing and Quantum Computing 373 22.4 Post--Quantum Cryptography (PQC) 377 22.5 Quantum Cryptography and Its Applications 378 22.6 Corporate Competitions Towards Quantum Computing 383 22.7 Threats Posed to Critical Infrastructure and Mechanisms 384 22.8 Conclusion 388 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory 395 Madhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil Rawat, Shrikant Telang and Anjali Rawat 23.1 Introduction 396 23.2 Literature Review 399 23.3 Problem Statement 401 23.4 Problem Elaboration 401 23.5 Proposed Methodology 402 23.6 Methods 404 23.7 Solution Approach 407 23.8 Expected Results 407 23.9 Conclusion 409 23.10 Abbreviations 410 24 Quantum Cryptography -- A Security Architecture 413 Sunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya Dabhade, Parikshit Bais and Ankita Singh 24.1 Introduction 413 24.2 Related Work 414 24.3 Properties of Quantum Information 415 24.4 Methodology 416 24.5 Supported Explanation 418 24.6 Conclusion 422 25 Quantum Computing Anomalies in Communication 425 Anushka Ayachit, Jahanvee Sharma, Bhupendra Panchal, Sunil Patil, Safdar Sardar Khan and Rijvan Beg 25.1 Introduction 425 25.2 Significance of Quantum Computing 427 25.3 The Dark Side of Quantum Computing 433 25.4 Previous Works 436 25.5 Conclusion 437 26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview 441 Ananya Upadhyay, Ruchir Namjoshi, Riya Jain, Jaideep Patel and Gayathri M. 26.1 Introduction 442 26.2 Related Work 443 26.3 Models for IDS 443 26.4 Conclusion 449 27 Quantum Computing in Military Applications and Operations 453 Aman Khubani, Anadi Sharma, Axith Choudhary, Om Shankar Bhatnagar and K. Chidambarathanu 27.1 Introduction 454 27.2 Literary Survey 455 27.3 Definition 456 27.4 Quantum Military Applications 462 27.5 Applications of QCRYP 465 27.6 Limitations 468 27.7 Conclusion 468 28 Quantum Cryptography Techniques: Evaluation 471 Shashank Sharma, T.M. Thiyagu, Om Kumar C.U. and D. Jeyakumar 28.1 Introduction 472 28.2 Quantum Technology (QTech) in Defence 473 28.3 The QKD Model 476 28.4 Related Work 478 28.5 Preliminaries 479 28.6 QKD Protocols Implementation 482 28.7 Risk Analysis 483 28.8 Applications of Quantum Cryptography 484 28.9 Challenges of Quantum Cryptography 485 28.10 Conclusion and Future Work 486 29 Cyber Crime Attack Vulnerability Review for Quantum Computing 489 Vaishnavi Gawde, Vanshika Goswami, Balwinder Kaur Dhaliwal, Sunil Parihar, Rupali Chaure and Mandakini Ingle 29.1 Introduction 490 29.2 Significance of Cyber Crime Attack for QC 492 29.3 Related Work 493 29.4 Proposed Methodology 494 29.5 Conclusion 500 References 501 About the Editors 505 Index 507
14.9 Quantum Teleportation -- 14.10 Applications of QCr in Cybersecurity -- 14.11 Quantum Key Distribution Protocols Implementation -- 14.12 Research and Work -- 14.13 Challenges Faced by QC -- 14.14 Limitations -- 14.15 Conclusion -- References -- 15 Quantum Computing to the Advantage of Neural Network -- 15.1 Introduction -- 15.2 Significance of Quantum Computers in Machine Learning -- 15.3 Related Work -- 15.4 Proposed Methodology -- 15.5 Result and Analysis -- 15.6 Conclusion -- Glossary -- References -- 16 Image Filtering Based on VQA with Quantum Security -- 16.1 Introduction -- 16.2 Related Work -- 16.3 Problem Statement -- 16.4 Working -- 16.5 Proposed Methodology Solution -- 16.6 Result Analysis -- 16.7 Conclusion -- References -- 17 Quantum Computing Techniques Assessment and Representation -- 17.1 Introduction -- 17.2 Fundamentals of QC -- 17.3 Properties of QC -- 17.4 Topography of QC -- 17.5 The Architecture of QC -- 17.6 Quantum Algorithm -- 17.7 Design Limitations of Quantum Computer -- 17.8 Different Categories of Quantum Computer -- 17.9 Advantages of QC -- 17.10 Disadvantages of QC -- 17.11 Applications of QC -- 17.12 Major Challenges in QC -- 17.13 Conclusion -- References -- 18 Quantum Computing Technological Design Along with Its Dark Side -- 18.1 Introduction -- 18.2 Related Work -- 18.3 History and Evolution of QCOM -- 18.4 Components &amp -- Concepts that Make QCOM Possible -- 18.5 Plans for the Future Development of Quantum Computer -- 18.6 Dark Side of QCOM -- 18.7 Plans for Protection in Quantum Era -- 18.8 Conclusion -- References -- 19 Quantum Technology for Military Applications -- 19.1 Introduction -- 19.2 Related Work -- 19.3 Overview of QTECH -- 19.4 QTECH in Defence -- 19.5 Military Applications of QTECH -- 19.6 Challenges and Consequences of Quantum Warfare -- 19.7 Conclusion -- References.
20 Potential Threats and Ethical Risks of Quantum Computing -- 20.1 Introduction -- 20.2 Research Design &amp -- Methodology -- 20.3 Brief In-Depth Overview of Possible Vulnerabilities -- 20.4 New Risks to be Created -- 20.5 Futuristic Picture of Quantum Ethics -- 20.6 Conclusion -- References -- 21 Is Quantum Computing a Cybersecurity Threat? -- 21.1 Introduction -- 21.2 How QCom Threatens Cybersecurity -- 21.3 How QCom could Improve Cybersecurity -- 21.4 Quantum Cryptography and Its Applications -- 21.5 Proposed Methodology -- 21.6 Background/Objective -- 21.7 Conclusion -- References -- 22 Quantum Computing in Data Security: A Critical Assessment -- 22.1 Introduction -- 22.2 Present Cryptographic Algorithms and Systems -- 22.3 Comparing Traditional Computing and Quantum Computing -- 22.4 Post-Quantum Cryptography (PQC) -- 22.5 Quantum Cryptography and Its Applications -- 22.6 Corporate Competitions Towards Quantum Computing -- 22.7 Threats Posed to Critical Infrastructure and Mechanisms -- 22.8 Conclusion -- References -- 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Problem Statement -- 23.4 Problem Elaboration -- 23.5 Proposed Methodology -- 23.6 Methods -- 23.7 Solution Approach -- 23.8 Expected Results -- 23.9 Conclusion -- 23.10 Abbreviations -- References -- 24 Quantum Cryptography â€" A Security Architecture -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Properties of Quantum Information -- 24.4 Methodology -- 24.5 Supported Explanation -- 24.6 Conclusion -- References -- 25 Quantum Computing Anomalies in Communication -- 25.1 Introduction -- 25.2 Significance of Quantum Computing -- 25.3 The Dark Side of Quantum Computing -- 25.4 Previous Works -- 25.5 Conclusion -- References.
26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview -- 26.1 Introduction -- 26.2 Related Work -- 26.3 Models for IDS -- 26.4 Conclusion -- References -- 27 Quantum Computing in Military Applications and Operations -- 27.1 Introduction -- 27.2 Literary Survey -- 27.3 Definition -- 27.4 Quantum Military Applications -- 27.5 Applications of QCRYP -- 27.6 Limitations -- 27.7 Conclusion -- References -- 28 Quantum Cryptography Techniques: Evaluation -- 28.1 Introduction -- 28.2 Quantum Technology (QTech) in Defence -- 28.3 The QKD Model -- 28.4 Related Work -- 28.5 Preliminaries -- 28.6 QKD Protocols Implementation -- 28.7 Risk Analysis -- 28.8 Applications of Quantum Cryptography -- 28.9 Challenges of Quantum Cryptography -- 28.10 Conclusion and Future Work -- References -- 29 Cyber Crime Attack Vulnerability Review for Quantum Computing -- 29.1 Introduction -- 29.2 Significance of Cyber Crime Attack for QC -- 29.3 Related Work -- 29.4 Proposed Methodology -- 29.5 Conclusion -- References -- About the Editors -- Index -- Also of Interest -- End User License Agreement.
Summary: Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Status Date due Barcode Item holds
EBOOK EBOOK COLLEGE LIBRARY
COLLEGE LIBRARY
005.80285 Q259 2023 (Browse shelf) Available
Total holds: 0

Intro -- Table of Contents -- Series Page -- Title Page -- Copyright Page -- Preface -- 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data -- 1.1 Introduction -- 1.2 Denial-of-Service Attacks -- 1.3 Related Work -- 1.4 Proposed Methodology -- 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking -- 1.6 Conclusion -- References -- 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography -- 2.1 Introduction -- 2.2 Properties of Quantum Computing -- 2.3 Applications of Quantum Computing -- 2.4 Background -- 2.5 Literature Survey -- 2.6 Proposed Work -- 2.7 Analysis of the Study -- 2.8 Conclusion -- References -- 3 DDoS Attack and Defense Mechanism in a Server -- 3.1 Introduction -- 3.2 DoS Attack -- 3.3 DDoS Attack -- 3.4 DDoS Mitigation -- 3.5 Conclusion -- Acknowledgement -- References -- 4 Dark Web Content Classification Using Quantum Encoding -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Proposed Approach -- 4.4 Result and Discussion -- 4.5 Conclusion -- References -- 5 Secure E-Voting Scheme Using Blockchain -- 5.1 Introduction -- 5.2 Literature Survey -- 5.3 Implementation and Methodology -- 5.4 Result Analysis &amp -- Output -- 5.5 Conclusion and Future Directions -- References -- 6 An Overview of Quantum Computingâ€"Based Hidden Markov Models -- 6.1 Introduction -- 6.2 Elaboration of Hidden Quantum Markov Model -- 6.3 Example of HQMMs (Isolated Word Recognition in Action) -- 6.4 Matching of State Observation Density -- 6.5 Conclusion and Results -- References -- 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives -- 7.1 Introduction to OS, AI and ML -- 7.2 Learning Configurations -- 7.3 Building ML Models -- 7.4 Work Done in Improving Process Scheduling.

Table of Contents
Preface xix

1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data 1
Anil V. Turukmane and Ganesh Khekare

1.1 Introduction 2

1.2 Denial-of-Service Attacks 3

1.3 Related Work 5

1.4 Proposed Methodology 8

1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking 10

1.6 Conclusion 13

2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography 17
Ambika N.

2.1 Introduction 18

2.2 Properties of Quantum Computing 19

2.3 Applications of Quantum Computing 22

2.4 Background 24

2.5 Literature Survey 25

2.6 Proposed Work 26

2.7 Analysis of the Study 27

2.8 Conclusion 29

3 DDoS Attack and Defense Mechanism in a Server 33
Pranav Bhatnagar, Shreya Pai and Minhaj Khan

3.1 Introduction 34

3.2 DoS Attack 37

3.3 DDoS Attack 39

3.4 DDoS Mitigation 51

3.5 Conclusion 54

4 Dark Web Content Classification Using Quantum Encoding 57
Ashwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud

4.1 Introduction 58

4.2 Related Work 61

4.3 Proposed Approach 65

4.4 Result and Discussion 70

4.5 Conclusion 76

5 Secure E-Voting Scheme Using Blockchain 81
Shrimoyee Banerjee and Umesh Bodkhe

5.1 Introduction 82

5.2 Literature Survey 87

5.3 Implementation and Methodology 89

5.4 Result Analysis & Output 100

5.5 Conclusion and Future Directions 102

6 An Overview of Quantum Computing--Based Hidden Markov Models 105
B. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal

6.1 Introduction 105

6.2 Elaboration of Hidden Quantum Markov Model 107

6.3 Example of HQMMs (Isolated Word Recognition in Action) 115

6.4 Matching of State Observation Density 117

6.5 Conclusion and Results 118

7 Artificial Intelligence and Qubit--Based Operating Systems: Current Progress and Future Perspectives 121
Tejashwa Agarwal and Amit Kumar Tyagi

7.1 Introduction to OS, AI and ML 122

7.2 Learning Configurations 123

7.3 Building ML Models 124

7.4 Work Done in Improving Process Scheduling 124

7.5 Artificial Intelligence in Distributed Operating Systems 128

7.6 Current Progress 129

7.7 Quantum Artificial Intelligence 133

7.8 Conclusion 135

8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act 137
Hepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu

8.1 Introduction 138

8.2 Conclusion 161

9 Quantum Computing Based on Cybersecurity 165
P. William, Vivek Parganiha and D.B. Pardeshi

9.1 Introduction 166

9.2 Preliminaries 166

9.3 Threat Landscape 168

9.4 Defensive Measurements, Countermeasures, and Best Practises 170

9.5 Conclusion 171

10 Quantum Cryptography for the Future Internet and the Security Analysis 175
P. William, A.B. Pawar and M.A. Jawale

10.1 Introduction 175

10.2 Related Works 177

10.3 Preliminaries 178

10.4 Quantum Cryptography for Future Internet 180

10.5 Conclusion 185

11 Security Aspects of Quantum Cryptography 189
P. William, Siddhartha Choubey and Abha Choubey

11.1 Introduction 189

11.2 Literature Survey 190

11.3 Quantum Key Distribution 192

11.4 Cryptography 193

11.5 Quantum Cryptography with Faint Laser Pulses 195

11.6 Eavesdropping 196

11.7 Conclusion 198

12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses 201
P. William, Vivek Parganiha and D.B. Pardeshi

12.1 Introduction 201

12.2 Quantum Computing Basics 202

12.3 Security Applications 206

12.4 Quantum Machine Learning 210

12.5 Conclusion 213

13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future 217
Nirav Bhatt and Amit Kumar Tyagi

13.1 Introduction 218

13.2 Background 219

13.3 Scope of this Work 220

13.4 Methodology and Analysis of Simulation Results 222

13.5 Quantum-Based Cybersecurity and Forensics 228

13.6 Conclusion and Future Works 230

14 Quantum Computing: A Software Engineering Approach 233
Mradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma

14.1 Introduction 234

14.2 Background of Research Area 235

14.3 Why Cryptography? 235

14.4 Classical Cryptography 238

14.5 Quantum Cryptography (QCr) 239

14.6 Quantum Key Distribution 240

14.7 Cryptanalysis 242

14.8 Entanglement 242

14.9 Quantum Teleportation 243

14.10 Applications of QCr in Cybersecurity 243

14.11 Quantum Key Distribution Protocols Implementation 244

14.12 Research and Work 244

14.13 Challenges Faced by QC 245

14.14 Limitations 245

14.15 Conclusion 246

15 Quantum Computing to the Advantage of Neural Network 249
Aditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat

15.1 Introduction 250

15.2 Significance of Quantum Computers in Machine Learning 251

15.3 Related Work 252

15.4 Proposed Methodology 255

15.5 Result and Analysis 258

15.6 Conclusion 258

16 Image Filtering Based on VQA with Quantum Security 263
Avni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan

16.1 Introduction 263

16.2 Related Work 267

16.3 Problem Statement 269

16.4 Working 269

16.5 Proposed Methodology Solution 270

16.6 Result Analysis 272

16.7 Conclusion 272

17 Quantum Computing Techniques Assessment and Representation 275
Dewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om Kumar C.U. and D. Jeyakumar

17.1 Introduction 276

17.2 Fundamentals of QC 278

17.3 Properties of QC 278

17.4 Topography of QC 280

17.5 The Architecture of QC 281

17.6 Quantum Algorithm 283

17.7 Design Limitations of Quantum Computer 284

17.8 Different Categories of Quantum Computer 286

17.9 Advantages of QC 287

17.10 Disadvantages of QC 287

17.11 Applications of QC 288

17.12 Major Challenges in QC 290

17.13 Conclusion 291

18 Quantum Computing Technological Design Along with Its Dark Side 295
Divyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat and Anjali Rawat

18.1 Introduction 296

18.2 Related Work 297

18.3 History and Evolution of QCOM 298

18.4 Components & Concepts that Make QCOM Possible 300

18.5 Plans for the Future Development of Quantum Computer 302

18.6 Dark Side of QCOM 306

18.7 Plans for Protection in Quantum Era 309

18.8 Conclusion 310

19 Quantum Technology for Military Applications 313
Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat and Kiran Pachlasiya

19.1 Introduction 314

19.2 Related Work 317

19.3 Overview of QTECH 318

19.4 QTECH in Defence 325

19.5 Military Applications of QTECH 327

19.6 Challenges and Consequences of Quantum Warfare 331

19.7 Conclusion 332

20 Potential Threats and Ethical Risks of Quantum Computing 335
Apurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar, Shrikant Telang and Anjali Rawat

20.1 Introduction 335

20.2 Research Design & Methodology 339

20.3 Brief In-Depth Overview of Possible Vulnerabilities 341

20.4 New Risks to be Created 349

20.5 Futuristic Picture of Quantum Ethics 350

20.6 Conclusion 352

21 Is Quantum Computing a Cybersecurity Threat? 353
Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish Chourey

21.1 Introduction 354

21.2 How QCom Threatens Cybersecurity 360

21.3 How QCom could Improve Cybersecurity 361

21.4 Quantum Cryptography and Its Applications 362

21.5 Proposed Methodology 363

21.6 Background/Objective 366

21.7 Conclusion 366 References 367

22 Quantum Computing in Data Security: A Critical Assessment 369
Sadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun Jhapate and Divyani Joshi

22.1 Introduction 370

22.2 Present Cryptographic Algorithms and Systems 371

22.3 Comparing Traditional Computing and Quantum Computing 373

22.4 Post--Quantum Cryptography (PQC) 377

22.5 Quantum Cryptography and Its Applications 378

22.6 Corporate Competitions Towards Quantum Computing 383

22.7 Threats Posed to Critical Infrastructure and Mechanisms 384

22.8 Conclusion 388

23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory 395
Madhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil Rawat, Shrikant Telang and Anjali Rawat

23.1 Introduction 396

23.2 Literature Review 399

23.3 Problem Statement 401

23.4 Problem Elaboration 401

23.5 Proposed Methodology 402

23.6 Methods 404

23.7 Solution Approach 407

23.8 Expected Results 407

23.9 Conclusion 409

23.10 Abbreviations 410

24 Quantum Cryptography -- A Security Architecture 413
Sunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya Dabhade, Parikshit Bais and Ankita Singh

24.1 Introduction 413

24.2 Related Work 414

24.3 Properties of Quantum Information 415

24.4 Methodology 416

24.5 Supported Explanation 418

24.6 Conclusion 422

25 Quantum Computing Anomalies in Communication 425
Anushka Ayachit, Jahanvee Sharma, Bhupendra Panchal, Sunil Patil, Safdar Sardar Khan and Rijvan Beg

25.1 Introduction 425

25.2 Significance of Quantum Computing 427

25.3 The Dark Side of Quantum Computing 433

25.4 Previous Works 436

25.5 Conclusion 437

26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview 441
Ananya Upadhyay, Ruchir Namjoshi, Riya Jain, Jaideep Patel and Gayathri M.

26.1 Introduction 442

26.2 Related Work 443

26.3 Models for IDS 443

26.4 Conclusion 449

27 Quantum Computing in Military Applications and Operations 453
Aman Khubani, Anadi Sharma, Axith Choudhary, Om Shankar Bhatnagar and K. Chidambarathanu

27.1 Introduction 454

27.2 Literary Survey 455

27.3 Definition 456

27.4 Quantum Military Applications 462

27.5 Applications of QCRYP 465

27.6 Limitations 468

27.7 Conclusion 468

28 Quantum Cryptography Techniques: Evaluation 471
Shashank Sharma, T.M. Thiyagu, Om Kumar C.U. and D. Jeyakumar

28.1 Introduction 472

28.2 Quantum Technology (QTech) in Defence 473

28.3 The QKD Model 476

28.4 Related Work 478

28.5 Preliminaries 479

28.6 QKD Protocols Implementation 482

28.7 Risk Analysis 483

28.8 Applications of Quantum Cryptography 484

28.9 Challenges of Quantum Cryptography 485

28.10 Conclusion and Future Work 486

29 Cyber Crime Attack Vulnerability Review for Quantum Computing 489
Vaishnavi Gawde, Vanshika Goswami, Balwinder Kaur Dhaliwal, Sunil Parihar, Rupali Chaure and Mandakini Ingle

29.1 Introduction 490

29.2 Significance of Cyber Crime Attack for QC 492

29.3 Related Work 493

29.4 Proposed Methodology 494

29.5 Conclusion 500

References 501

About the Editors 505

Index 507

14.9 Quantum Teleportation -- 14.10 Applications of QCr in Cybersecurity -- 14.11 Quantum Key Distribution Protocols Implementation -- 14.12 Research and Work -- 14.13 Challenges Faced by QC -- 14.14 Limitations -- 14.15 Conclusion -- References -- 15 Quantum Computing to the Advantage of Neural Network -- 15.1 Introduction -- 15.2 Significance of Quantum Computers in Machine Learning -- 15.3 Related Work -- 15.4 Proposed Methodology -- 15.5 Result and Analysis -- 15.6 Conclusion -- Glossary -- References -- 16 Image Filtering Based on VQA with Quantum Security -- 16.1 Introduction -- 16.2 Related Work -- 16.3 Problem Statement -- 16.4 Working -- 16.5 Proposed Methodology Solution -- 16.6 Result Analysis -- 16.7 Conclusion -- References -- 17 Quantum Computing Techniques Assessment and Representation -- 17.1 Introduction -- 17.2 Fundamentals of QC -- 17.3 Properties of QC -- 17.4 Topography of QC -- 17.5 The Architecture of QC -- 17.6 Quantum Algorithm -- 17.7 Design Limitations of Quantum Computer -- 17.8 Different Categories of Quantum Computer -- 17.9 Advantages of QC -- 17.10 Disadvantages of QC -- 17.11 Applications of QC -- 17.12 Major Challenges in QC -- 17.13 Conclusion -- References -- 18 Quantum Computing Technological Design Along with Its Dark Side -- 18.1 Introduction -- 18.2 Related Work -- 18.3 History and Evolution of QCOM -- 18.4 Components &amp -- Concepts that Make QCOM Possible -- 18.5 Plans for the Future Development of Quantum Computer -- 18.6 Dark Side of QCOM -- 18.7 Plans for Protection in Quantum Era -- 18.8 Conclusion -- References -- 19 Quantum Technology for Military Applications -- 19.1 Introduction -- 19.2 Related Work -- 19.3 Overview of QTECH -- 19.4 QTECH in Defence -- 19.5 Military Applications of QTECH -- 19.6 Challenges and Consequences of Quantum Warfare -- 19.7 Conclusion -- References.

20 Potential Threats and Ethical Risks of Quantum Computing -- 20.1 Introduction -- 20.2 Research Design &amp -- Methodology -- 20.3 Brief In-Depth Overview of Possible Vulnerabilities -- 20.4 New Risks to be Created -- 20.5 Futuristic Picture of Quantum Ethics -- 20.6 Conclusion -- References -- 21 Is Quantum Computing a Cybersecurity Threat? -- 21.1 Introduction -- 21.2 How QCom Threatens Cybersecurity -- 21.3 How QCom could Improve Cybersecurity -- 21.4 Quantum Cryptography and Its Applications -- 21.5 Proposed Methodology -- 21.6 Background/Objective -- 21.7 Conclusion -- References -- 22 Quantum Computing in Data Security: A Critical Assessment -- 22.1 Introduction -- 22.2 Present Cryptographic Algorithms and Systems -- 22.3 Comparing Traditional Computing and Quantum Computing -- 22.4 Post-Quantum Cryptography (PQC) -- 22.5 Quantum Cryptography and Its Applications -- 22.6 Corporate Competitions Towards Quantum Computing -- 22.7 Threats Posed to Critical Infrastructure and Mechanisms -- 22.8 Conclusion -- References -- 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Problem Statement -- 23.4 Problem Elaboration -- 23.5 Proposed Methodology -- 23.6 Methods -- 23.7 Solution Approach -- 23.8 Expected Results -- 23.9 Conclusion -- 23.10 Abbreviations -- References -- 24 Quantum Cryptography â€" A Security Architecture -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Properties of Quantum Information -- 24.4 Methodology -- 24.5 Supported Explanation -- 24.6 Conclusion -- References -- 25 Quantum Computing Anomalies in Communication -- 25.1 Introduction -- 25.2 Significance of Quantum Computing -- 25.3 The Dark Side of Quantum Computing -- 25.4 Previous Works -- 25.5 Conclusion -- References.

26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview -- 26.1 Introduction -- 26.2 Related Work -- 26.3 Models for IDS -- 26.4 Conclusion -- References -- 27 Quantum Computing in Military Applications and Operations -- 27.1 Introduction -- 27.2 Literary Survey -- 27.3 Definition -- 27.4 Quantum Military Applications -- 27.5 Applications of QCRYP -- 27.6 Limitations -- 27.7 Conclusion -- References -- 28 Quantum Cryptography Techniques: Evaluation -- 28.1 Introduction -- 28.2 Quantum Technology (QTech) in Defence -- 28.3 The QKD Model -- 28.4 Related Work -- 28.5 Preliminaries -- 28.6 QKD Protocols Implementation -- 28.7 Risk Analysis -- 28.8 Applications of Quantum Cryptography -- 28.9 Challenges of Quantum Cryptography -- 28.10 Conclusion and Future Work -- References -- 29 Cyber Crime Attack Vulnerability Review for Quantum Computing -- 29.1 Introduction -- 29.2 Significance of Cyber Crime Attack for QC -- 29.3 Related Work -- 29.4 Proposed Methodology -- 29.5 Conclusion -- References -- About the Editors -- Index -- Also of Interest -- End User License Agreement.

Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication.

Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second.

The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware.

About the Author
Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit.

Rajesh Kumar Chakrawarti, PhD, is a professor and the Dean of the Department of Computer Science & Engineering, Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of industry and academic experience and has published over 100 research papers and chapters in books.

Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University, Coordinator and Adjunct Professor, Utkal University, Bhubaneswar, India. He has over 23 years of academic experience and has authored textbooks, book chapters, and papers for journals and conferences. He has been a visiting doctoral fellow at the University of California, USA, and he has more than 30 patents to his credit.

Jaideep Patel, PhD, is a professor in the Computer Science and Engineering Department at the Sagar Institute of Research and Technology, Bhopal, India. He holds five patents, and has published two books and one book chapter.

Vivek Bhardwaj, PhD, is an assistant professor at Manipal University Jaipur, Jaipur, India. He has over eight years of teaching and research experience, has filed five patents, and has published many articles in scientific journals and conferences.

Anjali Rawat is a consultant for Apostelle Overseas Education, and she has over five years of consulting, teaching, and research experience. She has chaired international conferences and hosted several research events, and she holds several patents and has published research articles.

Hitesh Rawat is a faculty member in the Management Department at the Sri Aurobindo Institute of Technology and Management, Indore, India. He has over six years of consulting, teaching, and research experience and has also chaired international conferences and hosted several research events.

Description based on online resource; title from digital title page (viewed on October 25, 2023).

There are no comments for this item.

to post a comment.