Description |
1 online resource (223 p.) |
Contents |
Cover -- Half Title -- Series -- Title -- Copyright -- Contents -- Foreword -- Preface -- Acknowledgments -- List of Figures -- List of Tables -- List of Abbreviations -- Glossary -- Introduction -- 1 The Relevance of Quantum Cryptanalysis -- 1.1 National Quantum Programs -- 1.2 The Available Scientific Groundwork -- 1.3 Limiting Possibilities of Cryptanalysis Methods -- 1.4 The Quantum Threat of Blockchain -- 1.5 Requirements for Quantum Cryptanalysis -- 1.6 Verbal Statement of the Research Problem -- Conclusions on Chapter 1 -- 2 Implementation of the Shor Algorithm on a Quantum Circuit |
|
2.1 Applicability of Fourier transforms -- 2.2 Reformulation of the Factorization Problem -- 2.3 Shor Algorithm Modification -- 2.4 Estimating the Quantum Resources Needed -- 2.5 Example Implementation of Shor's Algorithm -- 2.6 Features of the Implementation of the Shor Algorithm -- 2.7 The Mathematical Task Definition -- Conclusions on Chapter 2 -- 3 Development of Quantum Cryptanalvsis Algorithms |
|
3.1 Assessment of the Durability of Modern Cryptographic Algorithms to Clarify the Cryptanalysis Tasks of Asymmetric Encryption Schemes (RSA or El Gamal) and Digital Signature (DSA, ECDSA, or RSA-PSS) in a Quantum Computing Model -- 3.2 Implementation of Cryptanalysis Algorithms -- 3.3 Implementation of the Shor Factorization Algorithm -- 3.4 Implementation of the Grover's Search Algorithm -- 3.5 Development of an Algorithm for Recovering a Symmetric Encryption Key -- 3.6 Development of an Algorithm for Cryptanalysis of the RSA Asymmetric Encryption System |
|
3.7 Development of an Algorithm for Cryptanalysis of the El Gamal System -- Conclusions on Chapter 3 -- 4 Development of the ""Q-Cryptanalysis" Platform -- 4.1 Features of the Implementation of the "Q-Cryptanalysis" platform -- 4.1.1 Q-cryptanalysis platform development tools -- 4.1.2 Q-cryptanalysis platform architecture -- 4.1.3 Example of "Q-cryptanalysis" platform operation -- 4.2 Features of the used Quantum Computing Model. -- 4.3 Testing of the "Q-Cryptanalysis" Platform -- 4.4 The Evaluation of the Effectiveness of the "Q-Cryptanalysis" Platform |
|
4.5 Possible Development Directions of the "Q-Cryptanalysis" Platform -- 4.6 A Feasibility Study for the Development of the "Q-Cryptanalysis" Platform -- Conclusions on Chapter 4 -- Conclusion -- References -- List of Open Training Courses in WWW -- Websites of Manufacturers Of Quantum Computers And Simulators -- Archives of Quantum Algorithms and Simulators -- List of Well-known National Quantum Programs -- Index -- About the Author -- Publications -- Projects |
Notes |
Description based upon print version of record |
Form |
Electronic book
|
ISBN |
9781000879483 |
|
1000879488 |
|
9781003392873 |
|
1003392873 |
|