Quantum Algorithms and Their Applications in Cryptology

個数:
  • 予約

Quantum Algorithms and Their Applications in Cryptology

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 304 p.
  • 言語 ENG
  • 商品コード 9781032998527

Full Description

Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. As technology has progressed, so has the complexity of the methods used to protect our data. In the wake of quantum computing's rise, traditional cryptographic systems face serious challenges, demanding a new understanding of how quantum algorithms could both undermine and enhance security.

Chapter 1 deals with the Basics of Cryptography lays the groundwork by introducing classical cryptography, tracing its evolution from ancient ciphers to modern cryptosystems. It provides foundational concepts such as stream and block ciphers and distinguishes between symmetric and asymmetric key systems, setting the stage for deeper cryptographic analysis in later chapters.

In Chapter 2, readers are introduced to Quantum Algorithms, the principles of quantum mechanics relevant to computing, including qubits, superposition, and entanglement. The chapter draws distinctions between classical and quantum computation and introduces key quantum algorithms and gates—forming the conceptual basis for understanding quantum cryptanalysis.

The Chapter 3 focuses on Shor's algorithm, a landmark quantum algorithm that threatens the security of widely used public-key cryptosystems like RSA and ECC. Readers explore its theoretical foundation, circuit implementation, and resource estimation, including practical experiments using IBM Qiskit.

In Chapter 4 Grover's Algorithm is examined in the context of brute-force attacks on symmetric key cryptography. The chapter includes a detailed cryptanalysis of the simplified Grain cipher using Grover's technique, and presents experimental results and quantum resource estimates for various attack scenarios.

Chapter 5 focusing on Simon's Algorithm and its role in breaking cryptographic primitives through structure exploitation. It details the application of Simon's algorithm to stream ciphers like Grain-128a, with thorough circuit design, implementation strategies, and test case evaluations.

In Chapter 6 a broader discussion about Cryptographic Implications of Quantum Computing is given on how quantum computing affects modern cryptographic systems. It explains the vulnerabilities of RSA, ECC, AES, and other algorithms under quantum threats and underscores the urgent need for transitioning to quantum-resistant alternatives.

Finally, in Chapter 7, the future of cryptography in the quantum era is discussed. It introduces Mosca's Theorem for risk forecasting and presents a taxonomy of quantum-safe cryptographic primitives. Topics include quantum key distribution (QKD), post-quantum cryptography (PQC), countermeasures, standardization, and infrastructure readiness for quantum networks.

Contents

Chapter 1. Basics of Cryptography. Chapter 2. An Introduction to Quantum Algorithms. Chapter 3. Shor's Algorithm: Factoring and Cryptanalysis. Chapter 4. Grover's Algorithm: Quantum Search. Chapter 5. Simon's Algorithm: Collision Finding. Chapter 6. Cryptographic Implications of Quantum Computing. Chapter 7. Future Trends and Applications

最近チェックした商品