Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. As technology has progressed, so has the complexity of the methods used to protect our data. In the wake of quantum computing’s rise, traditional cryptographic systems face serious challenges, demanding a new understanding of how quantum algorithms could both undermine and enhance security.
Chapter 1 deals with the Basics of Cryptography lays the groundwork by introducing classical cryptography, tracing its evolution from ancient ciphers to modern cryptosystems.
In Chapter 2, readers are introduced to Quantum Algorithms, the principles of quantum mechanics relevant to computing, including qubits, superposition, and entanglement.
Chapter 3 focuses on Shor’s algorithm, a landmark quantum algorithm that threatens the security of widely used public-key cryptosystems like RSA and ECC.
In Chapter 4, Grover’s Algorithm is examined in the context of brute-force attacks on symmetric key cryptography.
Chapter 5 focuses on Simon’s Algorithm and its role in breaking cryptographic primitives through structure exploitation.
In Chapter 6, a broader discussion about Cryptographic Implications of Quantum Computing is given on how quantum computing affects modern cryptographic systems.
Finally, in Chapter 7, the future of cryptography in the quantum era is discussed.
"synopsis" may belong to another edition of this title.
Bhupendra Singh is an alumnus of Allahabad University, IIT Madras, and Masaryk University, Brno, Czech Republic. He joined DRDO as a Scientist-B in 2005 and is currently working as a Scientist-F at the same organization. He is the project director of a project of national importance. His areas of research include the design and analysis of symmetric key cryptographic algorithms, the design and analysis of quantum-safe symmetric and asymmetric key cryptographic algorithms, the analysis of quantum random number generators, and construction of cryptographically significant Boolean functions and S-Boxes. He was a panelist at VAIBHAV- 2020 in the Quantum Technology Vertical, organized by the PMO. His team won the second prize of Rs. 2.5 lakhs at the International Quantum Science and Tech- nology Hackathon 2022, organized by the Office of the Principal Scientific Advisor, Government of India. Dr.Singh has been an elected executive committee member of the Cryptology Research Society of India since 2015. He has filed three patents and holds one copyright in the area of cybersecurity and quantum algorithms.
Mohankumar Mylsamy obtained his Ph.D. degree in Information and Com- munication Engineering from Anna University, Chennai, Tamil Nadu, India in 2020, received the M.E. degree in Information and Communication Engineering from Anna University of Technology, Coimbatore, India, in 2010; currently he is working as an Associate Professor in the Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering, Coimbatore, Tamilnadu, India. He served as principal investigator for a funded project from DRDO, focusing on Quantum Simulator and Cryptography algorithms. He is a life member of professional societies including ISTE and IAENG. His research interests include Wireless Sensor Networks, VLSI design, Image processing and Quantum Computing.
Thamaraimanalan Thangarajan holds a Ph.D. in Information and Com- munication Engineering, awarded by Anna University, Chennai, India. With a remarkable 15 years of teaching and 13 years of research experience, his expertise spans various domains, notably Quantum Computing and Cryptography. He currently serves as an Associate Professor at Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India. He served as Co-Principal Investigator of a DRDO funded project, focusing on Quantum Simulator and quantum cryptanalysis of asymmetric and symmetric key cryptographic algorithms. He has published several research papers in renowned international journals and presented his work at prestigious conferences, contributing significantly to advancements in his field of expertise. He is a member of professional societies including IEEE (Senior Member), ISTE, IETE, and IAENG. His research interests encompass quantum computing, artificial intelligence, machine learning, the Internet of Things (IoT), Low power VLSI design and Wireless Sensor Networks.
"About this title" may belong to another edition of this title.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 50553515-n
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. As technology has progressed, so has the complexity of the methods used to protect our data. In the wake of quantum computings rise, traditional cryptographic systems face serious challenges, demanding a new understanding of how quantum algorithms could both undermine and enhance security.Chapter 1 deals with the Basics of Cryptography lays the groundwork by introducing classical cryptography, tracing its evolution from ancient ciphers to modern cryptosystems.In Chapter 2, readers are introduced to Quantum Algorithms, the principles of quantum mechanics relevant to computing, including qubits, superposition, and entanglement.Chapter 3 focuses on Shors algorithm, a landmark quantum algorithm that threatens the security of widely used public-key cryptosystems like RSA and ECC.In Chapter 4, Grovers Algorithm is examined in the context of brute-force attacks on symmetric key cryptography.Chapter 5 focuses on Simons Algorithm and its role in breaking cryptographic primitives through structure exploitation.In Chapter 6, a broader discussion about Cryptographic Implications of Quantum Computing is given on how quantum computing affects modern cryptographic systems.Finally, in Chapter 7, the future of cryptography in the quantum era is discussed. Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. As technology has progressed, so has the complexity of the methods used to protect our data. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781032998527
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-344794
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEOCT25-316379
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. Seller Inventory # 26404574063
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Seller Inventory # 409661616
Quantity: 4 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # GB-9781032998527
Quantity: 2 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 50553515
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. Seller Inventory # 18404574053
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781032998527