Applied Quantum Cryptanalysis

Autor: 
Limba: 
english
Tip copertă: 
Greu
Număr de pagini: 
182
Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intelligence (AI) and machine learning (ML) technologies, cloud and foggy computing, a ...Descriere completă
687,40 RON

Informații detaliate

Mai multe informatii
ISBN9788770227933
AutorPetrenko Alexei
EdituraRiver Publ
Limbaenglish
Tip copertăPevná vazba
Anul publicării2023
Număr de pagini182

Descrierea cărții

Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intelligence (AI) and machine learning (ML) technologies, cloud and foggy computing, as well as technologies for collecting and streaming processing of Big Data and ETL, are constantly leading the lists of ""end-to-end"" information technologies for the digital economy of technologically developed countries of the world. One of the main reasons for this is the potential ability of quantum computers to solve some computational problems more efficiently than any of the most modern classical computers of the von Neumann architecture (supercomputers). The most expressive and interesting, from an applied point of view, examples of such problems are integer factorization, effectively performed by Shor's quantum algorithm, as well as record search in an unordered database, effectively solved by Grover's algorithm.

This monograph contains the best practice for solving problems of quantum cryptanalysis to improve cyber security and resilience of the digital economy. The book discusses well-known and author's software implementations of promising quantum Shor algorithms, Grover, Simon et al.

Shor's algorithm provides exponential acceleration of solving factorization problems, discrete logarithm problems (DLPs) and elliptic curve discrete logarithm problems (ECDLPs). The mentioned tasks are widely used in TLS, SSH or IPsec cryptographic applications of Internet/Intranet and IIoT/IoT networks, communication protocols based on Diffie-Hellman key agreements (dependent on the strength of the DLP or ECDLP), digital signature algorithms (DSA, ECDSA, RSA-PSS), public key encryption algorithms (El Gamal, RSA-OAEP), etc. In other words, Shor's quantum algorithm is potentially capable of violating these algorithms, and with them all the mechanisms of public-key cryptography deployed in cyberspace.

 

  1. velký výběr

    O SELECȚIE URIAȘĂ

    Peste 4 milioane de cărți în engleză la prețuri avantajoase.

  2. poštovné zdarma

    LIVRARE GRATUITĂ

    Livrare gratuită la comenzi de peste 300 Lei (Packeta.ro)

  3. skvělé ceny

    PREȚURI AVANTAJOASE

    Încercăm să păstrăm prețurile cărților cât mai mici și întotdeauna sub prețul recomandat de editură.

  4. online podpora

    PROGRAMUL MAGAZIN DE ÎNCREDERE

    Magazinul nostru a devenit un “Magazin de încredere“ pe baza recenziilor oferite de către clienții noștri reali.

  5. osobní přístup

    ABORDARE PERSONALĂ

    Cel mai important pentru noi este satisfacția Dvs. Vindem cărți deoarece le iubim. Nu suntem giganți transnaționali, ci o companie onestă din Republica Cehă. În plus, cele mai bune cărți au recenzii în blogul nostru.