Explore 1.5M+ audiobooks & ebooks free for days

From $11.99/month after trial. Cancel anytime.

Computational Intelligence and its Applications
Computational Intelligence and its Applications
Computational Intelligence and its Applications
Ebook596 pages4 hours

Computational Intelligence and its Applications

By Vikash Yadav (Editor), Vimal Kumar (Editor) and Sonam Gupta (Editor)

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Computational Intelligence and its Applications explores cutting-edge advancements in machine learning, data science, and their practical applications. This comprehensive guide caters to college students, researchers, and professionals equipping readers with the knowledge to navigate and leverage the latest trends in computational intelligence effectively.
Key Features:
- Emerging Technologies: Covers post-quantum cryptography, secure communication, and advancements in chatbot technology.
- Practical Applications: Includes stock price prediction, cloud computing, and data-driven DNA sequencing.
- Security and Detection: Enhances intrusion detection and analyzes crop disease using machine learning.
- Natural Language Processing: Explores sentiment analysis and the impact of big data on natural language processing.
- Advanced Techniques: Discusses blockchain technology, remote sensing, and depression detection on social media.
Readership:
Ideal for academia and industry alike.

LanguageEnglish
PublisherBentham Science Publishers
Release dateMar 14, 2025
ISBN9789815313321
Computational Intelligence and its Applications

Related to Computational Intelligence and its Applications

Related ebooks

Intelligence (AI) & Semantics For You

View More

Reviews for Computational Intelligence and its Applications

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Computational Intelligence and its Applications - Vikash Yadav

    Emerging Frontiers: Post-Quantum Cryptography and Secure Communication

    Namita Tiwari¹, *, Mayur Rahul¹, Vikash Yadav²

    ¹ CSJM University, Kanpur, Uttar pradesh, India

    ² Government Polytechnic Bighapur, Unnao, Department of Technical Education, Uttar Pradesh, India

    Abstract

    The field of cryptography is facing a significant challenge due to fast updates in computer history. This chapter explores the key concepts, techniques, and challenges associated with post-quantum cryptography (PQC). The chapter begins by introducing the fundamental principles of quantum computing and the threats it poses to traditional cryptography systems. Each family is examined in detail, highlighting its underlying mathematical foundations, security assumptions, and implementation considerations. The chapter also discusses the ongoing standardization efforts in post-quantum cryptography led by organizations such as the National Institute of Standards and Technology (NIST). Furthermore, the chapter explores the challenges and open research questions in the field, such as the efficient implementation of post-quantum algorithms, the impact on existing protocols and systems, and the integration of post-quantum cryptography into real-world applications.

    Keywords: Cryptography protocols, Message authentication codes (MACs), NIST, Post-quantum cryptography, Post-quantum algorithms, Quantum computers.


    * Corresponding author Namita Tiwari: CSJM University, Kanpur, Uttar pradesh, India;

    E-mail: [email protected]

    Introduction

    PQC is a field of study and research focusing on cryptography protocols that can withstand quantum computers. Quantum computers can potentially solve the underlying mathematical problems upon which current encryption algorithms are based, rendering them ineffective. PQC's goal is to develop new cryptography algorithms that can resist attacks by quantum computers. These algorithms are designed to provide security against both classical and quantum computers, ensuring that encrypted data remains protected in a post-quantum computing era. Secure communication involves protecting the content of the communication from unauthorized access, preventing any unauthorized modifications or tampering with the data, and verifying the identity of the communicating parties. To achieve secure communication, various cryptography techniques and protocols are employed. These techniques involve the use of encryption, which transforms the original message into an unintelligible form, making it difficult for eavesdroppers

    to understand. Only authorized recipients with the necessary decryption keys can decipher the encrypted message and retrieve the original information. Secure communication protocols also address the issue of data integrity. They ensure that the message remains unaltered during transit by employing message authentication codes (MACs) or digital signatures. These techniques verify the integrity of the data by attaching a small piece of information that is computed using cryptography algorithms [1].

    Furthermore, secure communication involves establishing the authenticity of the communicating parties. This is achieved through techniques like digital certificates and public key infrastructure (PKI), where each participant is issued a unique digital certificate that binds their identity to a public key. By verifying the digital certificate, the recipient can be assured of the sender's identity and establish a secure channel for communication. Secure communication is crucial in various contexts, including online banking, e-commerce, government communications, and sensitive data exchanges. It protects against eavesdropping, data tampering, impersonation attacks, and other forms of cyber threats, ensuring that sensitive information remains confidential and trustworthy throughout the communication process.

    Key Concepts: Fundamental Techniques and Cryptography Protocols

    There are several fundamental techniques and cryptography protocols used to achieve secure communication [2]. Here are some commonly employed techniques:

    Encryption: It is the process of coding plaintext (original message) into ciphertext (encrypted message) using an encryption algorithm and a secret key. It ensures that even if intercepted, the message cannot be understood without the corresponding decryption key. Popular encryption algorithms include AES and RSA.

    Symmetric Key Cryptography: It uses the common key for both coding and decoding, and the key must be shared through the proper channel. This approach is efficient for encrypting big data. Examples are AES, DES, and Blowfish.

    Asymmetric Key Cryptography: It involves a public and private key for encryption and decryption, respectively. It is used in secure key exchange and digital signatures. Examples are RSA, ECC, and Diffie-Hellman key exchange.

    Hash Functions: It converts the input of an arbitrary string to an output of a fixed string known as a message digest. Popular hash function algorithms are SHA-2, SHA-3, and message digest algorithm (MD5).

    Digital Signatures: These use asymmetric key cryptography to provide data integrity and non-repudiation. The sender uses its private key to make a unique digital signature, and the verifier verifies it using the corresponding public key.

    Transport-Layer Security TLS or Secure-Sockets Layer (SSL): These protocols provide secure communication over the Internet. SSL/TLS is commonly used in web browsing, email, etc.

    Virtual Private Networks (VPNs): VPNs create secure communication over public networks. VPNs are widely used for remote access, securing Wi-Fi connections, and maintaining privacy online.

    These techniques and protocols can be combined and tailored to specific communication needs, providing layers of security to protect sensitive information and ensure secure communication between parties [3].

    The following section examines the techniques and challenges associated with post quantum cryptography [4-7].

    Techniques/Challenges in Post-Quantum Cryptography

    Researchers are exploring various mathematical problems and cryptographic primitives believed to be intractable against quantum computers. Some of the promising approaches include:

    Lattice-based Cryptography: It includes Learning with Errors (LWE) and Ring Learning with Errors (RLWE) schemes, which offer security against attacks by both classical and quantum computers.

    Code-based Cryptography: It employs error-correcting codes to provide security. Schemes like McEliece and Niederreiter cryptosystems utilize the difficulty of decrypting the linear codes to achieve resistance against quantum attacks.

    Multivariate Cryptography: It is based on the hardness of solving multivariate polynomial equations. It involves schemes like Rainbow and the Unbalanced Oil and Vinegar (UOV) cryptosystems.

    Hash-based Cryptography: It employs cryptographic hash functions to construct digital signatures and key exchange protocols. Merkle trees and the Lamport signature scheme are examples of hash-based post-quantum cryptographic techniques.

    Supersingular isogeny-based cryptography: These schemes are based on elliptic curves and isogenies, and security relies on the hardness of certain isogeny problems.

    Lattice-based Cryptography

    It offers a promising alternative to traditional cryptographic systems, such as those based on number theory or elliptic curves, which may be vulnerable to quantum attacks.

    The main advantages of lattice-based cryptography include:

    Security: Lattice-based schemes are provable and secure based on the hardness of lattice problems, even against quantum computers.

    Post-quantum resistance: Lattice-based cryptography is considered a leading candidate for post-quantum cryptography, as the underlying lattice problems are not efficiently solvable by quantum algorithms.

    Versatility: Lattice-based techniques can be applied to various cryptographic primitives, including encryption, digital signatures, key exchange protocols, and secure multiparty computation.

    Efficiency: While lattice-based cryptography typically involves larger key sizes compared to traditional cryptographic systems, advances in lattice reduction algorithms and optimization techniques have improved the efficiency of lattice-based schemes.

    Some commonly used lattice-based cryptographic primitives include:

    Lattice-based encryption schemes (e.g., Learning With Errors Encryption, Ring-Learning With Errors Encryption).

    Lattice-based signature schemes (e.g., BLISS, Dilithium).

    Lattice-based key exchange protocols (e.g., New Hope, Frodo).

    Lattice-based fully homomorphic encryption (e.g., TFHE).

    As with any cryptographic system, it is essential to stay up to date with the latest advancements and rely on standardized and vetted implementations for secure deployment.

    Code-based Cryptography (CBC)

    It relies on error-correcting codes for providing security. The security of code-based cryptographic schemes is based on the hardness of certain decoding problems associated with error-correcting codes.

    In code-based cryptography, encryption, digital signatures, and key exchange protocols are constructed using error-correcting codes. These codes introduce redundancy into the transmitted data to detect and correct errors caused by noise or interference during transmission.

    Advantages of code-based cryptography include:

    Post-quantum resistance: CBC is considered a promising post-quantum alternative as the decoding problem used in these schemes.

    Well-studied and understood: Error-correcting codes have been extensively studied and used in various engineering applications, making the theoretical foundations of code-based cryptography well-developed.

    Relatively efficient: Code-based schemes can provide a good balance between security and efficiency, with practical implementations available.

    Compatibility with existing systems: Code-based cryptography can be implemented using existing infrastructure and protocols without major modifications, making it easier to integrate into existing systems.

    However, there are also some challenges and limitations associated with code-based cryptography:

    Key size: Code-based schemes typically require larger key sizes compared to traditional cryptographic systems, which may impact the efficiency and performance of the cryptographic operations.

    Key management: Key management in code-based cryptography can be more complex due to the large key sizes and potential vulnerabilities if key update procedures are not properly implemented.

    Limited deployment: Despite its post-quantum security, code-based cryptography has not yet been widely deployed, and the adoption of code-based schemes in real-world applications is still limited.

    Some well-known code-based cryptographic schemes include:

    McEliece cryptosystem.

    Niederreiter cryptosystem.

    RQC (Ring-LWE-based Quasi-Cyclic) cryptosystem.

    Multivariate Polynomial Cryptography (MPC)

    It relies on the computational hardness of solving systems of multivariate polynomial equations. Unlike traditional cryptographic systems that are based on number theory or elliptic curves, MPC utilizes the algebraic properties of polynomials to provide security.

    In MPC, algorithms are based on the evaluation of multivariate polynomial equations. These equations involve multiple variables and coefficients, and the security of the system depends on the difficulty of solving these equations to recover the original input.

    Solving systems of multivariate polynomial equations is a computationally difficult problem, even for powerful computers.

    There are several constructions and schemes within MPC, each with its own strengths and characteristics. Two notable examples of MPC schemes are:

    Rainbow: This scheme is a multivariate polynomial signature scheme. It uses a layered structure of polynomial equations and employs specific techniques to increase security while maintaining efficiency. Rainbow signatures are resistant to forgery and tampering attacks.

    Unbalanced Oil and Vinegar (UOV): This is another multivariate polynomial signature scheme. It is based on the concept of oil and vinegar mixing, where the polynomials are divided into two types: the oil polynomials that provide security and the vinegar polynomials that act as public information. UOV signatures offer high resistance against known attacks.

    The main challenge in implementing MPC is the efficiency and scalability of the cryptographic operations. Multivariate polynomial systems tend to have large equation sizes and require computationally intensive operations. Therefore, optimizing the performance of MPC schemes is an ongoing area of research.

    It is worth noting that while MPC has shown promising resistance against attacks, it may have some limitations compared to other post-quantum cryptography approaches. For example, MPC may be vulnerable to certain algebraic attacks or advancements in solving multivariate polynomial systems. Therefore, ongoing research and analysis are crucial to ensure the security of MPC in the face of evolving attacks and computational advancements.

    Hash-based Cryptography

    It is also known as hash-based digital signatures or one-time signatures. It is based on the computational hardness of finding collisions or per-image resistance in hash functions [3].

    In hash-based cryptography, a one-way hash function is used to derive a short fixed-length digest or hash value from an arbitrary-sized input message. The security of hash-based schemes is based on the assumption that finding collisions (two different inputs producing the same hash) or inverting the hash function (finding the original input from a given hash value) is computationally difficult.

    The main idea behind hash-based cryptography is to use a one-time signature scheme, where a different key pair is used for each signature. The public key is derived from the private key using the hash function, and the signature is generated by including the hash value of the message along with the private key. Verification is performed by hashing the received message and comparing it with the derived public key and the signature.

    Advantages of Hash-Based Cryptography

    Post-quantum resistance: Hash-based schemes are considered post-quantum secure, as their security is based on the hardness of finding collisions or inverting hash functions, which is believed to be resistant to quantum algorithms.

    Simplicity and efficiency: Hash functions are widely available, well-studied, and efficient cryptography primitives, making hash-based schemes relatively simple and efficient.

    Compatibility with existing systems: Hash-based cryptography can be integrated into existing protocols and systems with minimal modifications, as hash functions are already widely used in various applications.

    Minimal key management: In hash-based cryptography, the key management is relatively simple since new key pairs are generated for each signature. This eliminates the need for complex key distribution or revocation mechanisms.

    However, there are some challenges and limitations associated with hash-based cryptography:

    Signature size: Hash-based signatures can be significantly larger than traditional digital signatures, which may impact the efficiency and bandwidth requirements for signature generation and verification.

    Limited signature reuse: Hash-based signatures are generally designed for one-time use and cannot be reused for multiple messages. This can be impractical in scenarios where frequent signing is required.

    Migration challenges: Adopting hash-based cryptography may require significant changes in existing cryptography systems and protocols, which can be challenging to deploy and integrate.

    Some well-known hash-based signature schemes include:

    Lamport signatures.

    Winternitz signatures.

    Merkle signatures.

    Supersingular Isogeny-Based Cryptography

    It is based on the computational hardness of the isogeny problem in supersingular elliptic curves. It offers an alternative to traditional cryptography systems that may be vulnerable to attacks by quantum computers. In supersingular isogenyl- based cryptography, the security of the cryptographic schemes is based on the difficulty of finding the isogeny between two given elliptic curves. The main idea behind supersingular isogeny-based cryptography is to use the isogeny function as a trapdoor function. By starting with a known base curve and applying a sequence of isogenies, a public key is derived from the private key. The security lies in the computational hardness of computing the isogeny in the reverse direction, i.e., finding the private key from the public key.

    Advantages of supersingular isogeny-based cryptography include:

    Post-quantum resistance: Supersingular isogeny-based cryptography is designed to be resistant to attacks by both classical and quantum computers, as the underlying computational problem is believed to be hard even for quantum algorithms.

    Smaller key sizes: Supersingular isogeny-based cryptographic schemes often have smaller key sizes compared to some other post-quantum alternatives, which can be advantageous in terms of efficiency and storage requirements.

    Potential for efficient implementations: Advances in algorithmic techniques and efficient arithmetic on elliptic curves have led to more practical and efficient implementations of supersingular isogeny-based schemes.

    Compatibility with existing systems: Supersingular isogeny-based cryptography can be integrated into existing protocols and systems with proper modifications, allowing for compatibility and interoperability.

    However, there are also challenges and considerations in supersingular isogeny-based cryptography:

    Relatively new and ongoing research: Supersingular isogeny-based cryptography is still an active and new research area, and further analysis and scrutiny are needed to ensure its security and practicality.

    Performance trade-offs: While improvements in efficiency have been made, supersingular isogeny-based cryptography generally involves more computational overhead compared to some traditional cryptography systems.

    Standardization and adoption: Standardization efforts are underway to evaluate and establish the security and practicality of supersingular isogeny-based schemes. Adoption may depend on widespread acceptance and interoperability.

    Some well-known supersingular isogeny-based cryptographic schemes include:

    Supersingular-Isogeny Key Encapsulation (SIKE).

    Supersingular-Isogeny Diffie-Hellman (SIDH).

    Commutative-Supersingular-Isogeny Diffie-Hellman (CSIDH).

    As supersingular isogeny-based cryptography is a rapidly evolving field, it is essential to refer to the latest research and standardized specifications for the most up-to-date information on implementations and best practices.

    Challenges in Post Quantum Cryptography

    Security Analysis: Designing and analyzing secure post-quantum cryptographic algorithms is a significant challenge. It requires demonstrating resistance against attacks from both classical and quantum computers, ensuring provable security under various mathematical assumptions, and assessing the impact of algorithmic optimizations on security.

    Efficiency and Performance: Post-quantum cryptographic algorithms typically involve complex mathematical operations, which can be computationally expensive and require significant computational resources. Balancing security and efficiency is crucial to ensure the practical adoption of post-quantum cryptography.

    Standardization and Interoperability: Standardization plays a vital role in post-quantum cryptography to ensure interoperability and compatibility across different systems and platforms. Establishing standardized algorithms, protocols, and evaluation criteria requires collaboration among researchers, industry stakeholders, and standardization bodies.

    Integration into Existing Systems: Integrating post-quantum cryptographic algorithms into existing systems presents challenges, particularly in cases where legacy systems or protocols rely on classical cryptographic primitives. Ensuring backward compatibility, migration strategies, and seamless integration without compromising security is a key consideration.

    Key Management: Post-quantum cryptography introduces new challenges in key management. Key sizes for post-quantum cryptographic algorithms are typically larger than those used in traditional cryptography. Developing efficient and secure key management schemes, including key exchange and distribution, is essential.

    Awareness and Education: Raising awareness and educating the cryptographic community, system administrators, and end-users about post-quantum cryptography is crucial. Understanding the risks posed by quantum computers and the need to transition to post-quantum cryptographic techniques is essential for a smooth and secure transition.

    The Goal of PQC

    The transition to PQC involves careful consideration and planning, as it requires updating encryption protocols, key exchange mechanisms, digital signatures, and other cryptography primitives used in various systems, including secure communication protocols, digital certificates, and secure storage systems.

    Overall, the goal of post-quantum cryptography is to ensure that sensitive information remains secure even in the face of future quantum computers, providing long-term security for digital communications and data protection. Traditional cryptography systems, such as RSA and elliptic curve cryptography (ECC), rely on the difficulty of certain mathematical problems for their security. However, quantum computers have the potential to solve these problems much more efficiently, which poses a threat to the security of these traditional cryptography systems. One of the most well-known quantum algorithms, Shor's algorithm, can factor large numbers and solve the discrete logarithm problem (the foundation of RSA and ECC) in polynomial time, rendering these traditional cryptography systems insecure.

    PQC aims to develop new cryptography algorithms that are resistant to attacks by both classical and quantum computers. These algorithms are based on different mathematical problems that are believed to be hard, even for quantum computers. These are just a few examples of the different classes of post-quantum cryptography algorithms that are being studied and developed. The goal is to identify and standardize algorithms that provide secure alternatives to the currently used cryptography systems, ensuring that our data and communications remain secure in the post-quantum era.

    Power and Performance of Supercomputers

    Supercomputers are highly powerful and high-performance computing systems designed to perform complex calculations and solve computationally intensive problems. They are built using a combination of advanced processors, large amounts of memory, high-speed interconnects, and specialized software to achieve exceptional computational capabilities. Supercomputers are typically used for scientific research, engineering simulations, weather forecasting, molecular modeling, and other tasks that require massive computational resources.

    Here are some key characteristics and components of supercomputers:

    Processing Power: Supercomputers are designed to provide extremely high processing power by utilizing multiple processors or processor cores. These processors are often high-performance CPUs or specialized accelerators, such as GPUs or FPGAs.

    Parallelism: Supercomputers excel at parallel computing, dividing complex problems into smaller tasks that can be executed simultaneously. They employ parallel architectures and programming models to distribute computations across multiple processors or nodes, allowing for efficient parallel processing.

    High-speed Interconnects: Supercomputers incorporate high-bandwidth interconnects to enable fast communication between processors and nodes. These interconnects, such as Infini Band or Cray's Aries, minimize data transfer latency and maximize data throughput, facilitating efficient parallel computing.

    Large Memory Capacity: Supercomputers often have large amounts of memory (RAM) to handle massive data sets and enable efficient processing. This allows them to perform computations on extensive datasets or hold complex simulations entirely in memory.

    Storage Systems: Supercomputers typically have large-scale storage systems, including high-speed parallel file systems, for storing and accessing large volumes of data generated during computations. These storage systems provide fast data access to support the computational requirements of the supercomputer.

    Cooling and Power Infrastructure: Due to their high-performance nature, supercomputers generate significant heat and consume substantial power. They require specialized cooling systems, such as liquid cooling or advanced air cooling techniques, to dissipate heat effectively and maintain stable operating temperatures.

    System Software: Supercomputers use specialized software stacks and operating systems optimized for parallel computing. These software environments provide tools, libraries, and programming models that facilitate the development and execution of parallel applications on the supercomputer architecture.

    Notable supercomputers include systems like Summit, Sierra, Fugaku, and Tianhe-2. These supercomputers often rank among the top in the world in terms of processing power and performance. However, it's worth noting that the field of supercomputing is continually advancing, with new systems and technologies being developed to push the boundaries of computational capabilities even further.

    CONCLUSION

    In summary, post-quantum cryptography employs various techniques to develop cryptography algorithms that resist attacks from quantum computers. However, challenges related to security analysis, efficiency, standardization, integration, key management, and education must be addressed to ensure the successful adoption and deployment of post-quantum cryptography solutions in real-world applications. PQC is still an active research area, and no standardized algorithms have been established yet. However, various candidate algorithms are being developed and evaluated by the cryptography community and standardization bodies, such as NIST in the United States. Overall, this chapter aims to provide a comprehensive overview of PQC, highlighting its significance in addressing the security threats posed by quantum computers. Examining the various families of post-quantum algorithms, standardization efforts, challenges, and deployment considerations equips readers with a solid understanding of the field and paves the way for the development and adoption of secure cartographic solutions in the post-quantum era.

    REFERENCES

    Enjoying the preview?
    Page 1 of 1