Applied Quantum Cryptanalysis

Applied Quantum Cryptanalysis
Author :
Publisher : CRC Press
Total Pages : 207
Release :
ISBN-10 : 9781000879483
ISBN-13 : 1000879488
Rating : 4/5 (488 Downloads)

Book Synopsis Applied Quantum Cryptanalysis by : Alexei Petrenko

Download or read book Applied Quantum Cryptanalysis written by Alexei Petrenko and published by CRC Press. This book was released on 2023-04-13 with total page 207 pages. Available in PDF, EPUB and Kindle. Book excerpt: Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intelligence (AI) and machine learning (ML) technologies, cloud and foggy computing, as well as technologies for collecting and streaming processing of Big Data and ETL, are constantly leading the lists of ""end-to-end"" information technologies for the digital economy of technologically developed countries of the world. One of the main reasons for this is the potential ability of quantum computers to solve some computational problems more efficiently than any of the most modern classical computers of the von Neumann architecture (supercomputers). The most expressive and interesting, from an applied point of view, examples of such problems are integer factorization, effectively performed by Shor's quantum algorithm, as well as record search in an unordered database, effectively solved by Grover's algorithm. This monograph contains the best practice for solving problems of quantum cryptanalysis to improve cyber security and resilience of the digital economy. The book discusses well-known and author's software implementations of promising quantum Shor algorithms, Grover, Simon et al. Shor's algorithm provides exponential acceleration of solving factorization problems, discrete logarithm problems (DLPs) and elliptic curve discrete logarithm problems (ECDLPs). The mentioned tasks are widely used in TLS, SSH or IPsec cryptographic applications of Internet/Intranet and IIoT/IoT networks, communication protocols based on Diffie–Hellman key agreements (dependent on the strength of the DLP or ECDLP), digital signature algorithms (DSA, ECDSA, RSA-PSS), public key encryption algorithms (El Gamal, RSA-OAEP), etc. In other words, Shor's quantum algorithm is potentially capable of violating these algorithms, and with them all the mechanisms of public-key cryptography deployed in cyberspace.


Applied Quantum Cryptanalysis Related Books

Applied Quantum Cryptanalysis
Language: en
Pages: 207
Authors: Alexei Petrenko
Categories: Computers
Type: BOOK - Published: 2023-04-13 - Publisher: CRC Press

DOWNLOAD EBOOK

Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intelligence (AI) and machine learning (ML) te
Applied Quantum Cryptography
Language: en
Pages: 220
Authors: Christian Kollmitzer
Categories: Computers
Type: BOOK - Published: 2010-04-05 - Publisher: Springer

DOWNLOAD EBOOK

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te-
Applied Cryptography
Language: en
Pages: 926
Authors: Bruce Schneier
Categories: Computers
Type: BOOK - Published: 2017-05-25 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever publis
Applied Quantum Cryptanalysis
Language: en
Pages: 223
Authors: Alexei Petrenko
Categories: Computers
Type: BOOK - Published: 2023-04-13 - Publisher: CRC Press

DOWNLOAD EBOOK

Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intelligence (AI) and machine learning (ML) te
Real-World Cryptography
Language: en
Pages: 398
Authors: David Wong
Categories: Computers
Type: BOOK - Published: 2021-10-19 - Publisher: Simon and Schuster

DOWNLOAD EBOOK

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, G