|
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
A pseudorandom generator is an easy-to-compute function that
stretches a short random string into a much longer string that
"looks" just like a random string to any efficient adversary. One
immediate application of a pseudorandom generator is the
construction of a private key cryptosystem that is secure against
chosen plaintext attack.
There do not seem to be natural examples of functions that are
pseudorandom generators. On the other hand, there do seem to be a
variety of natural examples of another basic primitive: the one-way
function. A function is one-way if it is easy to compute but hard
for any efficient adversary to invert on average.
The first half of the book shows how to construct a pseudorandom
generator from any one-way function. Building on this, the second
half of the book shows how to construct other useful cryptographic
primitives, such as private key cryptosystems, pseudorandom
function generators, pseudorandom permutation generators, digital
signature schemes, bit commitment protocols, and zero-knowledge
interactive proof systems. The book stresses rigorous definitions
and proofs.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented
public key cryptography, an innovation that ultimately changed the
world. Today public key cryptography provides the primary basis for
secure communication over the internet, enabling online work,
socializing, shopping, government services, and much more. While
other books have documented the development of public key
cryptography, this is the first to provide a comprehensive
insiders' perspective on the full impacts of public key
cryptography, including six original chapters by nine distinguished
scholars. The book begins with an original joint biography of the
lives and careers of Diffie and Hellman, highlighting parallels and
intersections, and contextualizing their work. Subsequent chapters
show how public key cryptography helped establish an open
cryptography community and made lasting impacts on computer and
network security, theoretical computer science, mathematics, public
policy, and society. The volume includes particularly influential
articles by Diffie and Hellman, as well as newly transcribed
interviews and Turing Award Lectures by both Diffie and Hellman.
The contributed chapters provide new insights that are accessible
to a wide range of readers, from computer science students and
computer security professionals, to historians of technology and
members of the general public. The chapters can be readily
integrated into undergraduate and graduate courses on a range of
topics, including computer security, theoretical computer science
and mathematics, the history of computing, and science and
technology policy.
Discover how to take advantage of common cryptographic operations
to build safer apps that respect users' privacy with the help of
examples in JavaScript for Node.js and browsers Key Features
Understand how to implement common cryptographic operations in your
code with practical examples Learn about picking modern safe
algorithms, which libraries you should rely on, and how to use them
correctly Build modern and secure applications that respect your
users' privacy with cryptography Book DescriptionIf you're a
software developer, this book will give you an introduction to
cryptography, helping you understand how to make the most of it for
your applications. The book contains extensive code samples in
JavaScript, both for Node.js and for frontend apps running in a web
browser, although the core concepts can be used by developers
working with any programming language and framework. With a purely
hands-on approach that is focused on sharing actionable knowledge,
you'll learn about the common categories of cryptographic
operations that you can leverage in all apps you're developing,
including hashing, encryption with symmetric, asymmetric and hybrid
ciphers, and digital signatures. You'll learn when to use these
operations and how to choose and implement the most popular
algorithms to perform them, including SHA-2, Argon2, AES,
ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later,
you'll learn how to deal with password and key management. All code
in this book is written in JavaScript and designed to run in
Node.js or as part of frontend apps for web browsers. By the end of
this book, you'll be able to build solutions that leverage
cryptography to protect user privacy, offer better security against
an expanding and more complex threat landscape, help meet data
protection requirements, and unlock new opportunities. What you
will learn Write JavaScript code that uses cryptography running
within a Node.js environment for the server-side or in frontend
applications for web browsers Use modern, safe hashing functions
for calculating digests and key derivation, including SHA-2 and
Argon2 Practice encrypting messages and files with a symmetric key
using AES and ChaCha20-Poly1305 Use asymmetric and hybrid
encryption, leveraging RSA and Elliptic Curve Cryptography with
ECDH and ECIES Calculate and verify digital signatures using RSA
and ECDSA/EdDSA Manage passwords and encryption keys safely Who
this book is forThis cryptography book is an introductory guide for
software developers who don't necessarily have a background in
cryptography but are interested in learning how to integrate it in
their solutions, correctly and safely. You'll need to have at least
intermediate-level knowledge of building apps with JavaScript and
familiarity with Node.js to make the most of this book.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar,
cuts through the hype to bring us a first-hand look into how
quantum computing and Blockchain together could redefine industries
and life as we know it. Key Features Take a practical perspective
on quantum computing and Blockchain technologies and their impacts
on key industries Gain insights from experts who are applying
quantum computing or Blockchain in their fields See where quantum
computing and Blockchain are heading, and where the two may
intersect Book DescriptionAre quantum computing and Blockchain on a
collision course or will they be the most important trends of this
decade to disrupt industries and life as we know it? Fintech
veteran and venture capitalist Arunkumar Krishnakumar cuts through
the hype to bring us a first-hand look into how quantum computing
and Blockchain together are redefining industries, including
fintech, healthcare, and research. Through a series of interviews
with domain experts, he also explores these technologies' potential
to transform national and global governance and policies - from how
elections are conducted and how smart cities can be designed and
optimized for the environment, to what cyberwarfare enabled by
quantum cryptography might look like. In doing so, he also
highlights challenges that these technologies have to overcome to
go mainstream. Quantum Computing and Blockchain in Business
explores the potential changes that quantum computing and
Blockchain might bring about in the real world. After expanding on
the key concepts and techniques, such as applied cryptography,
qubits, and digital annealing, that underpin quantum computing and
Blockchain, the book dives into how major industries will be
impacted by these technologies. Lastly, we consider how the two
technologies may come together in a complimentary way. What you
will learn Understand the fundamentals of quantum computing and
Blockchain Gain insights from the experts who are using quantum
computing and Blockchain Discover the implications of these
technologies for governance and healthcare Learn how Blockchain and
quantum computing may influence logistics and finance Understand
how these technologies are impacting research in areas such as
chemistry Find out how these technologies may help the environment
and influence smart city development Understand the implications
for cybersecurity as these technologies evolve Who this book is
forThis book is for tech enthusiasts - developers, architects,
managers, consultants, and venture capitalists - working in or
interested in the latest developments in quantum computing and
blockchain. While the book introduces key ideas, terms, and
techniques used in these technologies, the main goal of this book
is to prime readers for the practical adoption and applications of
these technologies across varies industries and walks of life.
|
|