"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applicatio
Holistic Approach to Quantum Cryptography in Cyber Security
β Scribed by Shashi Bhushan; Manoj Kumar; Pramod Kumar; Renjith V Ravi; Anuj Kumar Singh
- Publisher
- CRC Press
- Year
- 2022
- Tongue
- English
- Leaves
- 257
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for graduate students, academic researchers, and professionals in areas including electrical and electronics engineering, computer science, and information technology.
β¦ Table of Contents
Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
Chapter 1 Toward Security in Software-Defined Networks with Trust and Monitoring
1.1 Introduction
1.1.1 SDN Architecture
1.2 Security Challenges in Software-Defined Networks
1.2.1 Threats to SDN
1.3 Literature ReviewβDifferent Approaches to SDN Security
1.3.1 Trust-Based Approaches
1.3.2 SDN Monitoring
1.4 Critical Analysis
1.5 Network Monitoring for Trust in SDNβA Concept
1.5.1 Proposed Security Concept
1.5.2 Objectives of the Proposed Concept
1.6 Experimental SetupβA Case Study
1.6.1 Telemetry Data
1.6.2 Authentication, Authorization, and Accounting Data
1.7 Conclusion
References
Chapter 2 Quantum Key Generation and Distribution Using Decoy State
2.1 Introduction
2.2 Decoy State
2.3 Attacks on Source
2.3.1 Trojan Horse Attack
2.3.2 Phase-Remapping Attack
2.3.3 Nonrandom Phase Attack
2.3.4 Photon-Number-Splitting Attack
2.4 Decoy State Method
2.4.1 Source
2.4.2 Channel
2.4.3 Detector
2.4.4 Yield
2.4.5 Process
2.5 Analysis of Two-Decoy State Protocol
2.5.1 Gain Analysis
2.5.2 QBER Analysis
2.5.3 Analysis of Key Generation Rate
2.6 Practical Implication of Decoy State Protocol
2.6.1 One Weak Stateβ+βOne Vacuum State
2.6.2 One Weak Decoy State
2.7 Comparative Studies between Existing Protocols on Secrecy and Key Generation Rate
2.8 Conclusion
References
Chapter 3 Cyber Security Techniques, Architectures, and Design
3.1 Introduction
3.2 Need for Cyber Security
3.2.1 Avoid Threats
3.2.2 Recognition and System Strengthening
3.2.3 Manage Functional, Architectural, and Technological Modernization
3.2.4 Plan for Emergency
3.2.5 Information Broadcasting
3.2.6 Expert Training
3.2.7 Harden System against Faults
3.2.8 Mitigate Vulnerabilities
3.2.9 Enhance Usability
3.2.10 Authentication
3.2.11 Efficient Security Methods
3.2.12 Interoperation of Devices
3.2.13 Emphasizing Susceptible Events
3.2.14 Propose Appropriate Security Measures
3.3 Cyber Security Framework
3.3.1 Framework Core
3.3.2 Deployment Tiers
3.3.3 Profiles
3.4 Functions of Cyber Security
3.4.1 Secure Provisioning
3.4.2 Functioning and Maintenance
3.4.3 Command and Regulate
3.4.4 Protect and Secure
3.4.5 Analyze
3.4.6 Operate and Collect
3.4.7 Investigate
3.5 Types of Security Attacks
3.5.1 Repudiation Attack
3.5.2 Modification of Message
3.5.3 Masquerade Attack
3.5.4 Denial-of-Service Attack
3.5.5 Replay Attack
3.5.6 Traffic Analysis
3.5.7 Cross-Site Scripting
3.5.8 Phishing
3.5.9 Release of Message Content
3.5.10 Hijacking
3.5.11 Spoofing
3.5.12 Sniffer Attack
3.5.13 Password Attack
3.5.14 Buffer Overflow
3.5.15 Exploit Attack
3.5.16 Snooping
3.6 Security Mechanisms
3.6.1 Routing Control
3.6.2 Traffic Padding
3.6.3 Encipherment
3.6.4 Digital Signature
3.6.5 Notarization
3.6.6 Access Control
3.6.7 Data Integrity
3.6.8 Authentication Exchange
3.6.9 Bit Stuffing
3.7 Models of Cyber Security
3.8 Cyber Security Applications
3.9 Cyber Security Challenges
3.10 Conclusions and Future Scope
References
Chapter 4 Secured Unmanned Aerial Vehicle-based Fog Computing Network: A Review
4.1 Introduction
4.1.1 Motivation and Contribution
4.1.2 Chapter Structure
4.2 Overview of UAVs and Fog Computing
4.2.1 Decentralized UAVs
4.2.2 Fog Computing
4.3 Quantum Security in UAV-FCN
4.3.1 Quantum Cryptography
4.3.2 Quantum Key Distribution
4.4 UAV-based Fog Computing Network
4.4.1 Collaboration of UAVs and Fog Computing
4.4.2 Network Design
4.5 Advantages and Challenges of UAV-based Fog Computing Network
4.6 Conclusion and Future scope
References
Chapter 5 Mars Surface Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype
5.1 Introduction
5.1.1 Motivation and Contribution
5.2 Previous Studies on Space UAVs
5.3 Types of UAVs for Space Exploration
5.3.1 Airships/Balloons
5.3.2 Vertical Take-Off and Landing
5.3.3 Glider
5.3.4 Flying Wing
5.4 Protocols and Threats in Space UAVs
5.4.1 Protocols for Space Missions
5.4.2 Communication Threats and Incidents
5.4.2.1 Jamming
5.4.2.2 Eavesdropping
5.4.2.3 Hijacking
5.4.2.4 Spoofing
5.4.3 Security in Space UAV Network
5.4.3.1 Crypto Security in Space Network
5.4.3.2 Quantum Security in Space UAV Communication
5.5 Design Model of UAV on the Martian Body
5.6 Environmental Considerations on the Surface of Martian Body
5.6.1 Air Pressure
5.6.2 Gravity
5.6.3 Air Density
5.6.4 Air Temperature
5.6.5 Speed of Sound
5.7 Parameters Considered in System Model and Simulation Results
5.8 Research Challenges
5.8.1 Endurance
5.8.2 Precondition
5.8.3 Hijacking
5.8.4 Coverage
5.8.5 Stability
5.8.6 Path Planning
5.9 Conclusion
References
Chapter 6 Quantum-Safe Asymmetric Cryptosystems: Current Solutions and Future Directions against Quantum Attacks
6.1 Introduction
6.1.1 Security Threat Faced by Quantum Computing
6.2 Shorβs Algorithm
6.3 Groverβs Algorithm
6.4 Existing Post-Quantum Security Schemes Addressing Confidentiality
6.5 Code-based Cryptography
6.5.1 McEllice Cryptosystem
6.6 Lattice-based Cryptography
6.6.1 Nth-Degree Truncated Polynomial Ring Units
6.6.2 Ring-LWE
6.7 Supersingular Elliptic Curve Isogeny-based Cryptography
6.8 Existing Post-Quantum Security Schemes Addressing Integrity
6.8.1 Lattice Based
6.8.1.1 NTRU Signature
6.8.1.2 BLISS
6.8.2 Multivariate Cryptography
6.8.2.1 Rainbow
6.8.3 Hash-based Signature Scheme
6.8.3.1 Stateful Signature Scheme
6.8.3.2 Stateless Signature Scheme
6.9 A Generic Hybrid Cryptosystem against Classical and Quantum Attack
6.10 Conclusion
References
Chapter 7 Cyber Security Technique for Internet of Things Using Machine Learning
7.1 Introduction: Background
7.1.1 Purposes of Research
7.1.2 Methodology of Research
7.2 Overview of Intrusion Detection Techniques
7.3 Methodology
7.3.1 Pre-process Data
7.3.2 Clustering
7.3.2.1 PAM Algorithm
7.3.3 Classification
7.3.4 Evaluation Method
7.4 Research Overview
7.4.1 Problem Definition
7.4.2 Experimentation and Results
7.4.3 Contribution and Impact
7.5 Conclusion
7.6 Future Scope of Work
References
Chapter 8 Image Encryption and Decryption through Quantum Cryptography
8.1 Introduction
8.2 Literature Survey
8.3 Introduction to Quantum Computing in Cryptography
8.3.1 Key Distribution
8.3.1.1 Main Parameters for Quantum Key Distribution
8.4 Quantum-based Digital Encryption and Decryption Scheme
8.4.1 Encryption of Images
8.4.2 Image Decoding
8.5 Implementation of the Algorithm
8.5.1 Performance Parameters
8.5.1.1 Cipher Randomity Evaluation
8.5.2 Pixel Consistency
8.5.3 Check for Correlation Pixels
8.5.3.1 Association of Original Images with Encryption
8.5.4 Three-dimensional, Single, and Encrypted Picture Color Strength
8.5.5 Entropy Research
8.6 Future Research in Quantum Cryptography
8.6.1 Unqualified Safety
8.6.2 Detection of Sniffing
8.6.3 QKDβs Safety
8.7 Conclusion
References
Chapter 9 Cyber Security Techniques Management
9.1 Introduction to Cyber Security
9.2 Cyber Security and Information Security Management
9.3 Cyber Security Measures
9.3.1 Passive Attack
9.3.1.1 Traffic Analysis
9.3.1.2 Release of Message Contents
9.3.2 Active Attack
9.4 Types of Cyber Attacks
9.4.1 DoS and DDoS Attacks
9.4.1.1 ICMP Flood
9.4.1.2 Ping of Death
9.4.1.3 SYN Flood
9.4.1.4 Buffer Overflow Attack
9.4.2 MITM Attack
9.4.3 Phishing Attacks
9.4.4 Spear-Phishing Attacks
9.4.5 Ransom Ware
9.4.6 Password Attack
9.4.7 SQL Injection Attack
9.4.8 DNS Spoofing
9.4.9 Session Hijacking
9.4.10 Brute Force Attack
9.5 Cyber Security Risk Management
9.5.1 Cyber Security Risk Management Strategy
9.5.2 Cyber Risk Management Process
9.5.3 Risk Analysis
9.5.4 Risk Evaluate
9.5.5 CyberSecurity Risk Management for Application Model
9.5.5.1 Cyber Security Risk Management for Internet of Things
9.5.5.2 CyberSecurity Risk Management for Blockchain
9.5.5.3 CyberSecurity Risks in Health Facilities
9.6 Summary
References
Chapter 10 Quantum Cryptography and Quantum Key Distribution
10.1 Introduction
10.2 Fundamentals of Quantum Cryptography
10.2.1 Heisenbergβs Uncertainty Principle
10.2.2 Quantum Entanglement
10.2.3 Photon Polarization
10.2.4 Quantum No-Cloning Theorem
10.3 Quantum Key Distribution
10.3.1 Prepare-and-Measure-based Quantum Key Distribution
10.3.1.1 BB84 Protocol
10.3.1.2 Other Prepare-and-Measure-based Protocols
10.3.2 An Entanglement-based Quantum Key Distribution
10.3.2.1 Ekertβs Protocol
10.3.2.2 Entangled BB84 Variants
10.4 Conclusion
References
Chapter 11 Quantum Cryptography: Basics, Effects on Communication, and Data Management
11.1 Introduction
11.1.1 Importance of Network Security
11.2 Cryptography Is Conventional Sense
11.3 Basic Schematic of Quantum Cryptosystem
11.4 Objective of Cryptographic System
11.5 Quantum Cryptography
11.6 Single-Photon Protocol
11.7 Entangled Particles (E91 Protocol)
11.8 Loss of Data in Quantum Computing
11.9 Qubit
11.10 Speed and Energy Consumption of an Engine
11.11 Entanglement
11.12 Light
11.13 Photons
11.14 Polarization Filters
11.15 Communication with Entangled Particles
11.16 Quantum Circuit
11.17 Quantum Parallelism
11.18 State of a Two-Qubit Quantum Register
11.19 Superposition
11.20 Quantum Superposition
11.21 Double Slit: An Example of Quantum Superposition
11.21.1 Application of Quantum Superposition
11.21.2 Quantum Superposition versus Quantum Entanglement
11.21.3 Superposition Probability Rule
11.21.4 Measurement of Superposition
11.21.5 Quantum Registers
11.21.6 Superposition and Uncertainty
11.21.7 State Space Dimension of Classical and Quantum Systems
11.22 Conclusion
References
Chapter 12 Quantum Number: Error Correction Circuits and Methods
12.1 Classical Error Correction Code versus Quantum Error Correction Code
12.2 Quantum Error Correction Circuit
12.2.1 Working of Quantum Error Correction Code
12.3 Types of Blunder in Quantum Computer
12.3.1 Bit Flip Code
12.3.1.1 Quantum Bit Flip Code
12.3.1.2 Flip Code Algorithm
12.3.2 Stabilizer Elements Detect Errors
12.3.3 Barriers in Existing Error Correction Method
12.3.3.1 Erasure Error
12.3.3.2 Stabilizer Codes
12.3.3.3 Error Detection Using Stabilizer Elements
12.3.3.4 Distance of a Stabilizer Cod
12.4 Phase Flip Code (Figure 12.2)
12.4.1 Quantum Circuit Implementation of Phase Flip Code
12.4.2 Bit Flip and Phase Flip Code
12.4.3 Bell States
12.4.4 QCL Implementation of Quantum Error Correction Code
12.4.5 Applications of Quantum Error Correction Circuit
12.4.6 Simulation Setup
12.4.7 Proposed System Hardware Implementation
12.4.8 Quantum Key Distribution
12.5 Spin or Polarization
12.5.1 Quantum Cryptography Using XOR Operator
12.5.2 Pseudo Code for the Proposed Quantum Cryptography
12.5.3 Random Substitution
12.5.4 Main Highlights of Arbitrary Replacements
12.5.5 Key Development Calculation in XOR Encryption
12.5.6 Hybrid Replacement
12.5.7 Advantages of Proposed Quantum Cryptography
12.5.8 Error Detection
12.5.9 Hardware Setup
12.6 Pseudo Code
12.6.1 Receiver Code Flow
12.6.2 Transmitter Code Flow
12.7 Simulation Setup
12.7.1 Receiver Setup
12.7.2 Summary
References
Chapter 13 Risk Analysis Assessment of Interdependency of Vulnerabilities: In Cyber-Physical Systems
13.1 Introduction
13.2 Threat Control Perspective
13.3 Methods for Scheming the Severity of Outbreak
13.3.1 Outbreak Sternness Quantitative Method
13.3.2 Outbreak Attainment Probability Quantitative Method
13.4 Impact of Vulnerabilities and Utilization Mode
13.5 Modeling Attacks on a CPS
13.6 Online Monitoring in a Cyber-Physical System
13.7 Conclusion
References
Index
π SIMILAR VOLUMES
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum
The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, P
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. As the internet is a very open and unprotected method of communicatio
<p><p>This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.</p><p>The 16 full and 6 short papers presented in this volume were carefully reviewed and selected fro