Quantum Computing in Cybersecurity (eBook, PDF)
Redaktion: Rawat, Romil; Rawat, Hitesh; Rawat, Anjali; Bhardwaj, Vivek; Patel, Jaideep; Sarangi, Sanjaya Kumar; Chakrawarti, Rajesh Kumar
Alle Infos zum eBook verschenken
Quantum Computing in Cybersecurity (eBook, PDF)
Redaktion: Rawat, Romil; Rawat, Hitesh; Rawat, Anjali; Bhardwaj, Vivek; Patel, Jaideep; Sarangi, Sanjaya Kumar; Chakrawarti, Rajesh Kumar
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 15.99MB
- Savo G. GlisicArtificial Intelligence and Quantum Computing for Advanced Wireless Networks (eBook, PDF)117,99 €
- Evolution and Applications of Quantum Computing (eBook, PDF)150,99 €
- Sandor ImreAdvanced Quantum Communications (eBook, PDF)132,99 €
- Daniel D. StancilPrinciples of Superconducting Quantum Computers (eBook, PDF)83,99 €
- Rodney van MeterQuantum Networking (eBook, PDF)139,99 €
- Kenneth RevettBehavioral Biometrics (eBook, PDF)110,99 €
- Emerging Computing Paradigms (eBook, PDF)103,99 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Wiley-Scrivener
- Seitenzahl: 544
- Erscheinungstermin: 20. Oktober 2023
- Englisch
- ISBN-13: 9781394167395
- Artikelnr.: 69232031
- Verlag: Wiley-Scrivener
- Seitenzahl: 544
- Erscheinungstermin: 20. Oktober 2023
- Englisch
- ISBN-13: 9781394167395
- Artikelnr.: 69232031
1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet
Mark for Big Data 1
Anil V. Turukmane and Ganesh Khekare
1.1 Introduction 2
1.2 Denial-of-Service Attacks 3
1.3 Related Work 5
1.4 Proposed Methodology 8
1.5 Trace Back Mechanism for Rectified Probabilistic Packet? Marking 10
1.6 Conclusion 13
2 Secure Distinctive Data Transmission in Fog System Using Quantum
Cryptography 17
Ambika N.
2.1 Introduction 18
2.2 Properties of Quantum Computing 19
2.3 Applications of Quantum Computing 22
2.4 Background 24
2.5 Literature Survey 25
2.6 Proposed Work 26
2.7 Analysis of the Study 27
2.8 Conclusion 29
3 DDoS Attack and Defense Mechanism in a Server 33
Pranav Bhatnagar, Shreya Pai and Minhaj Khan
3.1 Introduction 34
3.2 DoS Attack 37
3.3 DDoS Attack 39
3.4 DDoS Mitigation 51
3.5 Conclusion 54
4 Dark Web Content Classification Using Quantum Encoding 57
Ashwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud
4.1 Introduction 58
4.2 Related Work 61
4.3 Proposed Approach 65
4.4 Result and Discussion 70
4.5 Conclusion 76
5 Secure E-Voting Scheme Using Blockchain 81
Shrimoyee Banerjee and Umesh Bodkhe
5.1 Introduction 82
5.2 Literature Survey 87
5.3 Implementation and Methodology 89
5.4 Result Analysis & Output 100
5.5 Conclusion and Future Directions 102
6 An Overview of Quantum Computing--Based Hidden Markov Models 105
B. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal
6.1 Introduction 105
6.2 Elaboration of Hidden Quantum Markov Model 107
6.3 Example of HQMMs (Isolated Word Recognition in Action) 115
6.4 Matching of State Observation Density 117
6.5 Conclusion and Results 118
7 Artificial Intelligence and Qubit--Based Operating Systems: Current
Progress and Future Perspectives 121
Tejashwa Agarwal and Amit Kumar Tyagi
7.1 Introduction to OS, AI and ML 122
7.2 Learning Configurations 123
7.3 Building ML Models 124
7.4 Work Done in Improving Process Scheduling 124
7.5 Artificial Intelligence in Distributed Operating? Systems 128
7.6 Current Progress 129
7.7 Quantum Artificial Intelligence 133
7.8 Conclusion 135
8 Techno-Nationalism and Techno-Globalization: A Perspective from the
National Security Act 137
Hepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu
8.1 Introduction 138
8.2 Conclusion 161
9 Quantum Computing Based on Cybersecurity 165
P. William, Vivek Parganiha and D.B. Pardeshi
9.1 Introduction 166
9.2 Preliminaries 166
9.3 Threat Landscape 168
9.4 Defensive Measurements, Countermeasures, and Best Practises 170
9.5 Conclusion 171
10 Quantum Cryptography for the Future Internet and the Security Analysis
175
P. William, A.B. Pawar and M.A. Jawale
10.1 Introduction 175
10.2 Related Works 177
10.3 Preliminaries 178
10.4 Quantum Cryptography for Future Internet 180
10.5 Conclusion 185
11 Security Aspects of Quantum Cryptography 189
P. William, Siddhartha Choubey and Abha Choubey
11.1 Introduction 189
11.2 Literature Survey 190
11.3 Quantum Key Distribution 192
11.4 Cryptography 193
11.5 Quantum Cryptography with Faint Laser Pulses 195
11.6 Eavesdropping 196
11.7 Conclusion 198
12 Security Aspects of Quantum Machine Learning: Opportunities,? Threats
and Defenses 201
P. William, Vivek Parganiha and D.B. Pardeshi
12.1 Introduction 201
12.2 Quantum Computing Basics 202
12.3 Security Applications 206
12.4 Quantum Machine Learning 210
12.5 Conclusion 213
13 Cyber Forensics and Cybersecurity: Threat Analysis, Research? Statement
and Opportunities for the Future 217
Nirav Bhatt and Amit Kumar Tyagi
13.1 Introduction 218
13.2 Background 219
13.3 Scope of this Work 220
13.4 Methodology and Analysis of Simulation Results 222
13.5 Quantum-Based Cybersecurity and Forensics 228
13.6 Conclusion and Future Works 230
14 Quantum Computing: A Software Engineering Approach 233
Mradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma
14.1 Introduction 234
14.2 Background of Research Area 235
14.3 Why Cryptography? 235
14.4 Classical Cryptography 238
14.5 Quantum Cryptography (QCr) 239
14.6 Quantum Key Distribution 240
14.7 Cryptanalysis 242
14.8 Entanglement 242
14.9 Quantum Teleportation 243
14.10 Applications of QCr in Cybersecurity 243
14.11 Quantum Key Distribution Protocols Implementation 244
14.12 Research and Work 244
14.13 Challenges Faced by QC 245
14.14 Limitations 245
14.15 Conclusion 246
15 Quantum Computing to the Advantage of Neural Network 249
Aditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat
15.1 Introduction 250
15.2 Significance of Quantum Computers in Machine Learning 251
15.3 Related Work 252
15.4 Proposed Methodology 255
15.5 Result and Analysis 258
15.6 Conclusion 258
16 Image Filtering Based on VQA with Quantum Security 263
Avni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan
16.1 Introduction 263
16.2 Related Work 267
16.3 Problem Statement 269
16.4 Working 269
16.5 Proposed Methodology Solution 270
16.6 Result Analysis 272
16.7 Conclusion 272
17 Quantum Computing Techniques Assessment and Representation 275
Dewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om
Kumar C.U. and D. Jeyakumar
17.1 Introduction 276
17.2 Fundamentals of QC 278
17.3 Properties of QC 278
17.4 Topography of QC 280
17.5 The Architecture of QC 281
17.6 Quantum Algorithm 283
17.7 Design Limitations of Quantum Computer 284
17.8 Different Categories of Quantum Computer 286
17.9 Advantages of QC 287
17.10 Disadvantages of QC 287
17.11 Applications of QC 288
17.12 Major Challenges in QC 290
17.13 Conclusion 291
18 Quantum Computing Technological Design Along with Its Dark Side 295
Divyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat
and Anjali Rawat
18.1 Introduction 296
18.2 Related Work 297
18.3 History and Evolution of QCOM 298
18.4 Components & Concepts that Make QCOM Possible 300
18.5 Plans for the Future Development of Quantum Computer 302
18.6 Dark Side of QCOM 306
18.7 Plans for Protection in Quantum Era 309
18.8 Conclusion 310
19 Quantum Technology for Military Applications 313
Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat
and Kiran Pachlasiya
19.1 Introduction 314
19.2 Related Work 317
19.3 Overview of QTECH 318
19.4 QTECH in Defence 325
19.5 Military Applications of QTECH 327
19.6 Challenges and Consequences of Quantum? Warfare 331
19.7 Conclusion 332
20 Potential Threats and Ethical Risks of Quantum Computing 335
Apurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar,
Shrikant Telang and Anjali Rawat
20.1 Introduction 335
20.2 Research Design & Methodology 339
20.3 Brief In-Depth Overview of Possible Vulnerabilities 341
20.4 New Risks to be Created 349
20.5 Futuristic Picture of Quantum Ethics 350
20.6 Conclusion 352
21 Is Quantum Computing a Cybersecurity Threat? 353
Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish
Chourey
21.1 Introduction 354
21.2 How QCom Threatens Cybersecurity 360
21.3 How QCom could Improve Cybersecurity 361
21.4 Quantum Cryptography and Its Applications 362
21.5 Proposed Methodology 363
21.6 Background/Objective 366
21.7 Conclusion 366 References 367
22 Quantum Computing in Data Security: A Critical Assessment 369
Sadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun
Jhapate and Divyani Joshi
22.1 Introduction 370
22.2 Present Cryptographic Algorithms and Systems 371
22.3 Comparing Traditional Computing and Quantum Computing 373
22.4 Post--Quantum Cryptography (PQC) 377
22.5 Quantum Cryptography and Its Applications 378
22.6 Corporate Competitions Towards Quantum Computing 383
22.7 Threats Posed to Critical Infrastructure and Mechanisms 384
22.8 Conclusion 388
23 Quantum Computing and Security Aspects of Attention-Based Visual
Question Answering with Long Short-Term Memory 395
Madhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil? Rawat, Shrikant
Telang and Anjali Rawat
23.1 Introduction 396
23.2 Literature Review 399
23.3 Problem Statement 401
23.4 Problem Elaboration 401
23.5 Proposed Methodology 402
23.6 Methods 404
23.7 Solution Approach 407
23.8 Expected Results 407
23.9 Conclusion 409
23.10 Abbreviations 410
24 Quantum Cryptography -- A? Security Architecture 413
Sunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya? Dabhade, Parikshit
Bais and Ankita Singh
24.1 Introduction 413
24.2 Related Work 414
24.3 Properties of Quantum Information 415
24.4 Methodology 416
24.5 Supported Explanation 418
24.6 Conclusion 422
25 Quantum Computing Anomalies in Communication 425
Anushka Ayachit, Jahanvee Sharma, Bhupendra Panchal, Sunil Patil, Safdar
Sardar Khan and Rijvan Beg
25.1 Introduction 425
25.2 Significance of Quantum Computing 427
25.3 The Dark Side of Quantum Computing 433
25.4 Previous Works 436
25.5 Conclusion 437
26 Intrusion Detection System via Classical SVM and Quantum SVM: A
Comparative Overview 441
Ananya Upadhyay, Ruchir Namjoshi, Riya Jain, Jaideep Patel and Gayathri M.
26.1 Introduction 442
26.2 Related Work 443
26.3 Models for IDS 443
26.4 Conclusion 449
27 Quantum Computing in Military Applications and Operations 453
Aman Khubani, Anadi Sharma, Axith Choudhary, Om Shankar Bhatnagar and K.
Chidambarathanu
27.1 Introduction 454
27.2 Literary Survey 455
27.3 Definition 456
27.4 Quantum Military Applications 462
27.5 Applications of QCRYP 465
27.6 Limitations 468
27.7 Conclusion 468
28 Quantum Cryptography Techniques: Evaluation 471
Shashank Sharma, T.M. Thiyagu, Om Kumar C.U. and D. Jeyakumar
28.1 Introduction 472
28.2 Quantum Technology (QTech) in Defence 473
28.3 The QKD Model 476
28.4 Related Work 478
28.5 Preliminaries 479
28.6 QKD Protocols Implementation 482
28.7 Risk Analysis 483
28.8 Applications of Quantum Cryptography 484
28.9 Challenges of Quantum Cryptography 485
28.10 Conclusion and Future Work 486
29 Cyber Crime Attack Vulnerability Review for Quantum? Computing 489
Vaishnavi Gawde, Vanshika Goswami, Balwinder Kaur Dhaliwal, Sunil Parihar,
Rupali Chaure and Mandakini Ingle
29.1 Introduction 490
29.2 Significance of Cyber Crime Attack for QC 492
29.3 Related Work 493
29.4 Proposed Methodology 494
29.5 Conclusion 500
References 501
About the Editors 505
Index 507
1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet
Mark for Big Data 1
Anil V. Turukmane and Ganesh Khekare
1.1 Introduction 2
1.2 Denial-of-Service Attacks 3
1.3 Related Work 5
1.4 Proposed Methodology 8
1.5 Trace Back Mechanism for Rectified Probabilistic Packet? Marking 10
1.6 Conclusion 13
2 Secure Distinctive Data Transmission in Fog System Using Quantum
Cryptography 17
Ambika N.
2.1 Introduction 18
2.2 Properties of Quantum Computing 19
2.3 Applications of Quantum Computing 22
2.4 Background 24
2.5 Literature Survey 25
2.6 Proposed Work 26
2.7 Analysis of the Study 27
2.8 Conclusion 29
3 DDoS Attack and Defense Mechanism in a Server 33
Pranav Bhatnagar, Shreya Pai and Minhaj Khan
3.1 Introduction 34
3.2 DoS Attack 37
3.3 DDoS Attack 39
3.4 DDoS Mitigation 51
3.5 Conclusion 54
4 Dark Web Content Classification Using Quantum Encoding 57
Ashwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud
4.1 Introduction 58
4.2 Related Work 61
4.3 Proposed Approach 65
4.4 Result and Discussion 70
4.5 Conclusion 76
5 Secure E-Voting Scheme Using Blockchain 81
Shrimoyee Banerjee and Umesh Bodkhe
5.1 Introduction 82
5.2 Literature Survey 87
5.3 Implementation and Methodology 89
5.4 Result Analysis & Output 100
5.5 Conclusion and Future Directions 102
6 An Overview of Quantum Computing--Based Hidden Markov Models 105
B. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal
6.1 Introduction 105
6.2 Elaboration of Hidden Quantum Markov Model 107
6.3 Example of HQMMs (Isolated Word Recognition in Action) 115
6.4 Matching of State Observation Density 117
6.5 Conclusion and Results 118
7 Artificial Intelligence and Qubit--Based Operating Systems: Current
Progress and Future Perspectives 121
Tejashwa Agarwal and Amit Kumar Tyagi
7.1 Introduction to OS, AI and ML 122
7.2 Learning Configurations 123
7.3 Building ML Models 124
7.4 Work Done in Improving Process Scheduling 124
7.5 Artificial Intelligence in Distributed Operating? Systems 128
7.6 Current Progress 129
7.7 Quantum Artificial Intelligence 133
7.8 Conclusion 135
8 Techno-Nationalism and Techno-Globalization: A Perspective from the
National Security Act 137
Hepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu
8.1 Introduction 138
8.2 Conclusion 161
9 Quantum Computing Based on Cybersecurity 165
P. William, Vivek Parganiha and D.B. Pardeshi
9.1 Introduction 166
9.2 Preliminaries 166
9.3 Threat Landscape 168
9.4 Defensive Measurements, Countermeasures, and Best Practises 170
9.5 Conclusion 171
10 Quantum Cryptography for the Future Internet and the Security Analysis
175
P. William, A.B. Pawar and M.A. Jawale
10.1 Introduction 175
10.2 Related Works 177
10.3 Preliminaries 178
10.4 Quantum Cryptography for Future Internet 180
10.5 Conclusion 185
11 Security Aspects of Quantum Cryptography 189
P. William, Siddhartha Choubey and Abha Choubey
11.1 Introduction 189
11.2 Literature Survey 190
11.3 Quantum Key Distribution 192
11.4 Cryptography 193
11.5 Quantum Cryptography with Faint Laser Pulses 195
11.6 Eavesdropping 196
11.7 Conclusion 198
12 Security Aspects of Quantum Machine Learning: Opportunities,? Threats
and Defenses 201
P. William, Vivek Parganiha and D.B. Pardeshi
12.1 Introduction 201
12.2 Quantum Computing Basics 202
12.3 Security Applications 206
12.4 Quantum Machine Learning 210
12.5 Conclusion 213
13 Cyber Forensics and Cybersecurity: Threat Analysis, Research? Statement
and Opportunities for the Future 217
Nirav Bhatt and Amit Kumar Tyagi
13.1 Introduction 218
13.2 Background 219
13.3 Scope of this Work 220
13.4 Methodology and Analysis of Simulation Results 222
13.5 Quantum-Based Cybersecurity and Forensics 228
13.6 Conclusion and Future Works 230
14 Quantum Computing: A Software Engineering Approach 233
Mradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma
14.1 Introduction 234
14.2 Background of Research Area 235
14.3 Why Cryptography? 235
14.4 Classical Cryptography 238
14.5 Quantum Cryptography (QCr) 239
14.6 Quantum Key Distribution 240
14.7 Cryptanalysis 242
14.8 Entanglement 242
14.9 Quantum Teleportation 243
14.10 Applications of QCr in Cybersecurity 243
14.11 Quantum Key Distribution Protocols Implementation 244
14.12 Research and Work 244
14.13 Challenges Faced by QC 245
14.14 Limitations 245
14.15 Conclusion 246
15 Quantum Computing to the Advantage of Neural Network 249
Aditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat
15.1 Introduction 250
15.2 Significance of Quantum Computers in Machine Learning 251
15.3 Related Work 252
15.4 Proposed Methodology 255
15.5 Result and Analysis 258
15.6 Conclusion 258
16 Image Filtering Based on VQA with Quantum Security 263
Avni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan
16.1 Introduction 263
16.2 Related Work 267
16.3 Problem Statement 269
16.4 Working 269
16.5 Proposed Methodology Solution 270
16.6 Result Analysis 272
16.7 Conclusion 272
17 Quantum Computing Techniques Assessment and Representation 275
Dewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om
Kumar C.U. and D. Jeyakumar
17.1 Introduction 276
17.2 Fundamentals of QC 278
17.3 Properties of QC 278
17.4 Topography of QC 280
17.5 The Architecture of QC 281
17.6 Quantum Algorithm 283
17.7 Design Limitations of Quantum Computer 284
17.8 Different Categories of Quantum Computer 286
17.9 Advantages of QC 287
17.10 Disadvantages of QC 287
17.11 Applications of QC 288
17.12 Major Challenges in QC 290
17.13 Conclusion 291
18 Quantum Computing Technological Design Along with Its Dark Side 295
Divyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat
and Anjali Rawat
18.1 Introduction 296
18.2 Related Work 297
18.3 History and Evolution of QCOM 298
18.4 Components & Concepts that Make QCOM Possible 300
18.5 Plans for the Future Development of Quantum Computer 302
18.6 Dark Side of QCOM 306
18.7 Plans for Protection in Quantum Era 309
18.8 Conclusion 310
19 Quantum Technology for Military Applications 313
Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat
and Kiran Pachlasiya
19.1 Introduction 314
19.2 Related Work 317
19.3 Overview of QTECH 318
19.4 QTECH in Defence 325
19.5 Military Applications of QTECH 327
19.6 Challenges and Consequences of Quantum? Warfare 331
19.7 Conclusion 332
20 Potential Threats and Ethical Risks of Quantum Computing 335
Apurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar,
Shrikant Telang and Anjali Rawat
20.1 Introduction 335
20.2 Research Design & Methodology 339
20.3 Brief In-Depth Overview of Possible Vulnerabilities 341
20.4 New Risks to be Created 349
20.5 Futuristic Picture of Quantum Ethics 350
20.6 Conclusion 352
21 Is Quantum Computing a Cybersecurity Threat? 353
Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish
Chourey
21.1 Introduction 354
21.2 How QCom Threatens Cybersecurity 360
21.3 How QCom could Improve Cybersecurity 361
21.4 Quantum Cryptography and Its Applications 362
21.5 Proposed Methodology 363
21.6 Background/Objective 366
21.7 Conclusion 366 References 367
22 Quantum Computing in Data Security: A Critical Assessment 369
Sadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun
Jhapate and Divyani Joshi
22.1 Introduction 370
22.2 Present Cryptographic Algorithms and Systems 371
22.3 Comparing Traditional Computing and Quantum Computing 373
22.4 Post--Quantum Cryptography (PQC) 377
22.5 Quantum Cryptography and Its Applications 378
22.6 Corporate Competitions Towards Quantum Computing 383
22.7 Threats Posed to Critical Infrastructure and Mechanisms 384
22.8 Conclusion 388
23 Quantum Computing and Security Aspects of Attention-Based Visual
Question Answering with Long Short-Term Memory 395
Madhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil? Rawat, Shrikant
Telang and Anjali Rawat
23.1 Introduction 396
23.2 Literature Review 399
23.3 Problem Statement 401
23.4 Problem Elaboration 401
23.5 Proposed Methodology 402
23.6 Methods 404
23.7 Solution Approach 407
23.8 Expected Results 407
23.9 Conclusion 409
23.10 Abbreviations 410
24 Quantum Cryptography -- A? Security Architecture 413
Sunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya? Dabhade, Parikshit
Bais and Ankita Singh
24.1 Introduction 413
24.2 Related Work 414
24.3 Properties of Quantum Information 415
24.4 Methodology 416
24.5 Supported Explanation 418
24.6 Conclusion 422
25 Quantum Computing Anomalies in Communication 425
Anushka Ayachit, Jahanvee Sharma, Bhupendra Panchal, Sunil Patil, Safdar
Sardar Khan and Rijvan Beg
25.1 Introduction 425
25.2 Significance of Quantum Computing 427
25.3 The Dark Side of Quantum Computing 433
25.4 Previous Works 436
25.5 Conclusion 437
26 Intrusion Detection System via Classical SVM and Quantum SVM: A
Comparative Overview 441
Ananya Upadhyay, Ruchir Namjoshi, Riya Jain, Jaideep Patel and Gayathri M.
26.1 Introduction 442
26.2 Related Work 443
26.3 Models for IDS 443
26.4 Conclusion 449
27 Quantum Computing in Military Applications and Operations 453
Aman Khubani, Anadi Sharma, Axith Choudhary, Om Shankar Bhatnagar and K.
Chidambarathanu
27.1 Introduction 454
27.2 Literary Survey 455
27.3 Definition 456
27.4 Quantum Military Applications 462
27.5 Applications of QCRYP 465
27.6 Limitations 468
27.7 Conclusion 468
28 Quantum Cryptography Techniques: Evaluation 471
Shashank Sharma, T.M. Thiyagu, Om Kumar C.U. and D. Jeyakumar
28.1 Introduction 472
28.2 Quantum Technology (QTech) in Defence 473
28.3 The QKD Model 476
28.4 Related Work 478
28.5 Preliminaries 479
28.6 QKD Protocols Implementation 482
28.7 Risk Analysis 483
28.8 Applications of Quantum Cryptography 484
28.9 Challenges of Quantum Cryptography 485
28.10 Conclusion and Future Work 486
29 Cyber Crime Attack Vulnerability Review for Quantum? Computing 489
Vaishnavi Gawde, Vanshika Goswami, Balwinder Kaur Dhaliwal, Sunil Parihar,
Rupali Chaure and Mandakini Ingle
29.1 Introduction 490
29.2 Significance of Cyber Crime Attack for QC 492
29.3 Related Work 493
29.4 Proposed Methodology 494
29.5 Conclusion 500
References 501
About the Editors 505
Index 507