In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.
This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries.
Key topics covered include:
An overview of quantum computing and its implications for blockchain security.
Current cryptographic standards and their vulnerabilities in the face of quantum threats.
Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems.
Case studies and real-world implications of quantum-resistant blockchain implementations.
Strategies for integrating post-quantum cryptography into existing blockchain frameworks.
Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.
Report
Share
Report
Share
1 of 54
Download to read offline
More Related Content
Similar to Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Post Quantum Cryptography – The Impact on Identityteam-WIBU
As PQC continues to be a major topic for many companies and Government Institutions, we take a dive into the topics of quantum computers, post-quantum-cryptography, and the potential relevance for (ID) use cases.
This seminar would like to present the principles of the technology and the latest developments in this field as well some indication as to the relevance, impact, and consequences on (Government) ID projects or use cases. The seminar may also look towards the relationship with these projects not only from a hardware standpoint but also from a software algorithmic stance as we migrate from current used crypto systems to quantum-proof systems.
KEY TAKEAWAYS
What is a Quantum Computer, what is Post Quantum Cryptography and when will we see a quantum computer?
The migration from current crypto systems to quantum proof systems.
How will PQC and QC affect (Government) ID projects and implementations.
What will QC mean for the security proofing of ID and Information in the future.
TARGET AUDIENCE
Interested parties in the field of Identity and Security.
Government bodies looking to the future for ID document management systems
Enterprises looking to understand the potential impact of QC upon their business and industries.
PRESENTATION: Cryptoagility and Quantum Resistance: Easier Said Than Done.
Ever since the publication of Shor’s quantum algorithm for the factorization of large numbers, it has been known that quantum computers could at some point pose a threat to our communication and data security. Today we have cloud access to small, functioning quantum computers. The answer to this threat is quantum-resistant cryptography: cryptographic methods for classical computers that are robust against attacks by quantum computers.
The standardization of such methods is currently ongoing. However, these methods are based on mathematical problems, that are much younger than the factorization problem already investigated by Euclid. On the other hand, currently used cryptographic methods such as RSA or ECDSA are broken as soon as a sufficiently large quantum computer exists. Cryptoagility is therefore recommended, software should be built or modified in such a way that cryptographic algorithms are easily substitutable. But how great is the danger posed by quantum computers? To what extent is cryptography affected, and when do we need to take action? Is cryptoagility really so easy to implement in practice or is this perhaps much easier said than done?
The Crypto Quantum Leap is a term that encapsulates the anticipated transformation of the cryptocurrency and blockchain space due to the advent of quantum computing technology. Quantum computing differs from classical computing by using qubits (quantum bits), which can exist in multiple states simultaneously, allowing for unprecedented computational power. This leap suggests that as quantum computing matures, it could significantly impact various aspects of the cryptocurrency ecosystem, including the security of cryptographic keys, consensus mechanisms, and mining processes. To prepare for this quantum future, the industry is actively researching quantum-resistant cryptographic methods and exploring alternative consensus algorithms. The Crypto Quantum Leap represents a pivotal shift in the way cryptocurrencies operate, compelling stakeholders to adapt and innovate in the face of quantum computing's disruptive potential.
Quantum Computing: Unleashing the Power of Quantum MechanicsTechCyber Vision
Quantum computing is an emerging field that utilizes principles of quantum mechanics to process information. While still in early stages, it has made progress in areas like quantum algorithms, error correction, and physical implementations. Major challenges remain around scaling up qubits, reducing errors, and developing practical applications. Continued research and collaboration are needed to realize quantum computing's full potential to solve problems beyond the capabilities of classical computers.
Quantum Computing & Cryptography: A Brief IntroductionHedera Hashgraph
Often touted as the next computational paradigm, many race to develop the first large-scale quantum computer. Google’s recent announcement that they achieved quantum supremacy — the ability for a quantum computer to do something a classical computer cannot — highlights concerns on whether we are prepared for a post-quantum world, one in which widely deployed cryptographic algorithms are broken. But how advanced are quantum computers really, and should we be worried about their impact on distributed ledger technologies?
Join Atul Luykx, Head of Cryptography at Hedera Hashgraph, to learn how quantum computing is impacting cryptography and its applications. In this webinar, you’ll learn:
- What happens when cryptography is broken?
- How quantum computing breaks cryptography?
- What can be done to avoid quantum attacks?
- Hedera Hashgraph’s approach on quantum resistance in its consensus algorithm and public ledger.
- Updates on the latest post-quantum cryptography developments
This document discusses quantum computing technologies including quantum supremacy, quantum sensors, and the quantum internet. It provides information on Google's quantum computer Sycamore and its processing of 53 qubits in 200 seconds, which would take thousands of years for a classical computer. It also discusses the development of quantum hardware companies, investments in quantum computing, and potential applications in encryption, imaging, and materials modeling. Barriers to progress mentioned include the short coherence times of quantum systems and challenges in scaling to larger numbers of high-quality qubits. The document aims to provide an overview of the current state of quantum technologies for internal business use at Juniper.
This document provides an overview of quantum computing. It discusses key concepts like qubits, superposition, and entanglement. Qubits can exist in superposition of states |0> and |1> allowing quantum computers to perform multiple calculations in parallel. Entanglement links the states of qubits. The document also covers applications in artificial intelligence and cybersecurity. Quantum cryptography uses principles of quantum mechanics for encryption but has limitations like short communication ranges and high costs.
Quantum computing provides an alternative computational model based on quantum mechanics. It utilizes quantum phenomena such as superposition and entanglement to perform computations using quantum logic gates on qubits. This allows quantum computers to potentially solve certain problems exponentially faster than classical computers. However, building large-scale quantum computers remains a challenge. In the meantime, smaller quantum systems are being developed and quantum algorithms are being experimentally tested on these devices. Researchers are also working on methods to efficiently simulate quantum computations on classical computers.
Quantum Computing and its security implicationsInnoTech
Quantum computers work with qubits that can exist in superposition and be entangled. They have enormous computational power compared to digital computers and could solve problems like prime factorization rapidly. This poses risks to current encryption methods and allows for perfectly secure quantum communication. Several types of quantum computers are being developed, from quantum annealers to analog and universal models, with the latter offering exponential speedups but being the hardest to build. Significant progress is being made, with quantum computers in the tens of qubits now and the need to transition encryption to post-quantum algorithms within the next decade.
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
La criptografía cuántica es una de las joyas de la corona del cómputo cuántico. Además de conocerse a detalle el fundamento teórico de los protocolos de esta disciplina, se ha hecho investigación experimental por más de dos décadas y, como resultado, existen ya equipos de criptografía cuántica que se pueden comprar e instalar bajo la lógica de cualquier producto comercial.
En esta plática, titulada “Criptografía cuántica - fundamentos, productos y empresas”, el Dr Venegas Andraca dará una introducción concisa a los protocolos de criptografía cuántica BB84 y EK91, describirá las ventajas que estos protocolos tienen respecto de protocolos populares de criptografía convencional, expondrá las restricciones tecnológicas de BB84 y EK91, presentará los equipos de criptografía cuántica disponibles en el mercado y dará un análisis sucinto de las estimaciones de crecimiento comercial de esta disciplina.
The document provides an overview of quantum computing basics, including:
- Types of quantum computers such as quantum annealers, analog quantum computers, and universal quantum computers.
- Key concepts such as qubits, the smallest unit of quantum information that can be in a superposition of states, and common physical implementations like ions and photons.
- Challenges like errors that can occur and approaches to error correction using techniques like Shor's code and topological quantum codes.
- An example of Schrodinger's cat thought experiment that illustrates the strange nature of quantum superposition.
Quantum computing harnesses the principles of quantum mechanics to perform calculations in parallel using quantum bits (qubits) that can exist in superposition. The first proposals for quantum computing date back to the 1980s. Current quantum computers have around 50-100 qubits and are being developed by companies like IBM, Google, and Intel to potentially solve problems like cryptography and AI that are intractable on classical computers. However, building reliable quantum computers remains challenging due to issues like qubit decoherence. Potential applications include optimization, simulation, and machine learning.
We discuss the emerging threat and implications of quantum computing technology on the security of cryptosystems currently deployed in applications, and why system designers should consider addressing this risk already in the near term. We then discuss an overview of the current approaches for building quantum safe cryptosystems and their security and performance aspects. We conclude with a glimpse at the state of the art and research challenges in the area of quantum-safe cryptography, including the design of more advanced quantum-safe cryptographic protocols, such as privacy-preserving cryptocurrencies.
Quantum computing has the potential to solve certain problems exponentially faster than classical computers by exploiting principles like superposition, entanglement, and interference. Current quantum computers with 50-100 qubits operate in the Noisy Intermediate-Scale Quantum (NISQ) era and use algorithms like the Variational Quantum Eigensolver (VQE) that are hybrid quantum-classical and incorporate techniques like quantum error mitigation. Major players in the field include IBM, Google, and Rigetti who are developing quantum hardware and software for applications in optimization, simulation, and machine learning.
quantum computing basics roll no 15.pptxtoget48099
The document discusses quantum computing, providing an overview of classical computers and their evolution. It then introduces quantum computers, explaining key concepts like quantum superposition, entanglement, and teleportation. Quantum computers could solve problems like factorization exponentially faster than classical computers. While promising for applications like encryption, simulation, and optimization, quantum computing faces challenges like difficulty controlling qubits and requiring isolated environments. The document envisions future work developing silicon-based quantum computers, new algorithms, and using quantum computers to simulate other quantum systems.
Quantum algorithms like VQE and QAOA were used to analyze the impact of COVID-19 on optimal portfolio selection across different industries. Three time periods were considered - pre-COVID, during COVID, and post-COVID. Results found that COVID disrupted optimal portfolios, with sectors like retail, technology and automotive favored more pre-COVID, while oil/gas and airlines/hospitality favored post-COVID. Quantum algorithms provided comparable results to classical methods like Markowitz for portfolio optimization under changing market conditions from the pandemic.
This research paper gives an overview of quantum computers – description of their operation, differences between quantum and silicon computers, major construction problems of a quantum computer and many other basic aspects. No special scientific knowledge is necessary for the reader.
This document provides an overview of quantum computing, including its history, key concepts, differences from classical computing, applications, advantages, and challenges. Quantum computing uses quantum bits that can exist in superposition and entanglement, allowing massive parallelism. Some potential applications include factoring, simulation, optimization, and secure communication. However, challenges include difficulty controlling quantum states and building reliable quantum hardware. Future work may focus on developing silicon-based designs and new algorithms to better exploit quantum computing.
The document provides an overview of quantum computing concepts and the IBM Quantum Experience platform. It begins with a short history of quantum computing developments from the 1930s to present. It then explains basic quantum concepts like qubits, superposition, entanglement, and quantum gates. The document outlines requirements for building a quantum computer, including well-defined qubits, initialization, gates, coherence times, and measurement. It describes the IBM Quantum Experience as a platform that provides access to an actual quantum processor via the cloud, along with simulation and tutorial capabilities. Users can design circuits using a graphical Quantum Composer interface and run algorithms on real quantum hardware or simulation.
Similar to Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats (20)
Blockchain and Cyber Defense Strategies in new genre timesanupriti
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.
Data Protection in a Connected World: Sovereignty and Cyber Securityanupriti
Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense measures essential for modern digital ecosystems.
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESanupriti
The presentation is one unique presentation peculiar to TALLINN MANUAL version 1.0 and 2.0. Along with is discussed cyber policy attempts of other countries.The Tallinn Manual has long been the flagship research initiative of the NATO CCDCOE. The original Tallinn Manual (published in 2013 by Cambridge University Press) addressed the most severe cyber operations followed by version 2.0. The presentation cover the origin details of why this manual arrived at the global scene and what followed around at the global attempts for framing the global cyber policy.
Cyber Security : An attempt to assimilate and technically understand itanupriti
his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
While anyone of us discusses cryptocurrency, we invariably hover around BITCOIN only , but as on date we have 2000+ cryptocurrencies in the world and the sad thing is CRYPTOCURRENCY CRIMES ARE RISING FAST undeterred.This presentation, given at the IETE mid term symposium on 23rd May 2020 ,brings a brief over view of how cryptocrimes work and what are the challenges around?
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Proof of Work and connect with BYZANTINE Generalsanupriti
Proof of Work (PoW) is the original blockchain consensus algorithm, and is used in projects such as Bitcoin. It is the mechanism that enables users on a blockchain network to reach an agreed ‘truth’. A proof of work is essentially an answer to a complex mathematical problem. It takes a lot of work to find the Nonce but is easy for others to validate.PoW solves the Byzantine Generals Problem as it achieves a majority agreement without any central authority, in spite of the presence of unknown/potentially untrustworthy parties and despite the network not being instantaneous.This presentation brings out the concept Byzantine Generals proof and its connect with Bitcoin.
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEanupriti
The world of Blockchain and Cryptocurrencies is undeniably amazing and has infinity to explore at hands.Recently I took on a 4 hour session at the prestigious Central Bureau of Investigations,CBI Academy ,Ghaziabad, vide Indian Technical and Economic Cooperation Programme organised by Ministry of External Affairs , to cover right from scratch to overview of mechanics and architecture of how this world works.Sharing here the presentation for info and awareness of anyone who is interested to take a dip in this domain and related cyber crime activities.
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies anupriti
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies was held at G D Goenka University, Sohna Road,Gurgaon on 22nd Feb 2018.Sharing here the presentation I gave for info.Readers may contact me for any clarifications on the subject content please.
This document discusses Bitcoin and blockchain technology. It begins with an introduction to Bitcoin, including its use as a digital currency and the blockchain network that underlies it. It then provides definitions of key Bitcoin and blockchain terms, such as wallets, addresses, mining, blocks, and hashes. The document also discusses tools and techniques related to Bitcoin forensics, such as analyzing blockchain data and artifacts from seized computers and devices.
This document provides examples to explain the Swirlds hashgraph consensus algorithm. It shows a hashgraph growing over time as members create events and gossip with each other. Each event contains cryptographic hashes linking it to previous events. Rounds are defined, with each member's first event in a round being a "witness." Elections are held for witnesses to determine if they are "famous," with later witnesses counting votes. The goal is for all members to reach consensus on the order and timestamps of all events.
Presentation I gave at 4th International Information Security Meet in the Hakon 2017 conference on 08th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at http://www.hakonindia.org/hakon-2017-speakers/
Presentation I gave at BRIGHTTALK webinar in the BLOCKCHAIN SUMMIT on 10th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at https://www.brighttalk.com/webcast/1570/272431/bitcoin-forensics
The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics ie Bitcoin Forensics. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.But with a pleothra of advantages that it offers,there is a definete side to worry too and thats the money laundering transactions.On an average it is estimated that around 3 lakh bitcoin transactions happen inside a day and its not an easy task any day for a forensic investigator to trace the origins here.This presentation will bring out the technical overview and evolving forensics developments in the domain.
Blockchain and Bitcoin : A Technical Overviewanupriti
Blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block and is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks.Bitcoin is a proven application that runs on BLOCKCHAIN.This ppt gives the reader an over view of the concept of BLOCKCHAIN.The same was presented by self on 20th June 2017 at Gurgaon Commissioner of Police office during Summer Internship Program under aegis of Shri Rakshit Tandon
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
The Equation Group is a highly advanced secretive computer espionage group, suspected by security expert Claudio Guarnieri and unnamed former intelligence operatives of being tied to the United States National Security Agency (NSA). Because of the group's predilection for strong encryption methods in their operations, the name Equation Group was chosen by Kaspersky Lab, which discovered this operation and also documented 500 malware infections by the group's tools in at least 42 countries.This presentation gives an over view in brief based on the Kaspersky Report.
This small presentation wil sail through a set of questions for any web/Internet user and will mark for every question as the user decides to answer.The safety score as it ends up lets the user know of where he stands in terms of IT SECURITY on the web!!!!
This document provides a checklist for hardening an Android device with various security settings and recommendations. It suggests forgetting unused Wi-Fi networks, turning off location services and Bluetooth when not in use, limiting saved SMS/MMS messages, updating to the latest OS version, and not rooting or installing apps from untrusted sources. It also recommends enabling encryption, auto-lock, and the Android Device Manager for remote wiping a lost device. Additional security measures mentioned include disabling network notifications and form auto-fill, and showing security warnings for visited sites.
Harden your LinkedIn Settings : A Necessity Nowanupriti
Most of us are part of various Social Engineering Sites and keep updating ourselves via status updates, pictures and tweeting small life updates. Related privacy and security issues in respect of these social engineering sites available is already a serious concern among users. Additionally for these all social engineering sites/applications whether accessible on a desktop or a mobile, we all are not so serious responding and interacting but that’s the difference when we see viz-a-viz LinkedIn. When it is LinkedIn…we are mostly serious…no jokes, no clips, no tagging, no personal comments, no WOWs…it’s all professional. And when most of us take it seriously, we also feed serious inputs on it. But do we take necessary precautions too?...I have mostly seen a negated curve amongst my friend circle….hardly anyone has spared time to configure LinkedIn Privacy and Security settings. In this post I bring you out basic and necessary configuration steps involved to harden your LinkedIn interface to the world.
APT 28 :Cyber Espionage and the Russian Government?anupriti
Russia may be behind a long-standing, careful campaign designed to steal sensitive data relating to governments, militaries and security firms worldwide.This presentation based on a report made public by FireEye brings an over view of their opinion.....uploaded here just for general info to understand how its all happening!!!!
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
1. International Conference on Recent Developments in Cyber Security (ReDCySec2023)
30-31 May, 2024
Organized by Center for Cyber Security and Cryptology, Sharda University
Presenter:
Paper ID:
Navigating Post-Quantum Blockchain: Resilient
Cryptography in Quantum Threats
by
Dr Anupam Tiwari, Ph.D
#7
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
2. — Problem Statement
— Introduction
— Cryptographic Primitives in Blockchain Technology
— Vulnerabilities of current cryptography to QC attacks in Blockchain Technology
— Foundations of PQC
— Literature Review
— Current State
— Challenges
— Conclusion
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
PRESENTATION LAYOUT
3. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Navigating Post-Quantum Blockchain: Resilient
Cryptography in Quantum Threats
PROBLEM STATEMENT
4. INTRODUCTION
— Blockchain banks heavily on CRYPTOGRAPHY
— Blockchain imparts all it’s well known characteristics attributed to CRYPTOGRAPHY
• Transparency
• Redundancy
• Accountability
• Immutability
• Decentralization
• Consensus - Proof-of-work
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
5. Traditional CRYPTOGRAPHIC algorithms, which have effectively
demonstrated data integrity and privacy, now are confronted with
QUANTUM COMPUTERS
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
INTRODUCTION
7. RSA: Based on prime factorization
difficulty.
AES: Utilizes substitution-permutation
network.
DES: Employs Feistel network
structure.
ECC: Relies on elliptic curve
properties.
Diffie-Hellman: Solves discrete
logarithm problem.
SHA: Uses Merkle-Damgård construction
Blowfish: Variable key length Feistel
network.
Twofish: Variable key size substitution-
permutation network.
DSA: Modular exponentiation for
signatures.
RC4: Stream cipher for data encryption.
Well known Encryption and Hashing Algorithms
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
8. Where is Cryptography used in Blockchain Technology?
—Hash Functions
• Data Integrity
• Digital Signatures and Authenticity
—Public-Key Infrastructure (PKI) and Key Exchange
• Cryptographic Random Number Generators
• Merkle trees
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
9. VULNERABILITIES OF CURRENT CRYPTOGRAPHY TO QC ATTACKS
IN
BLOCKCHAIN TECHNOLOGY
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
10. Vulnerabilities of Current Cryptography to QC Attacks in BCT
—Shor's Algorithm
• Quantum algorithm for factoring large integers.
• Threatens security of RSA and other cryptographic schemes.
• Exponential speedup over classical factoring algorithms.
• Basis for potential quantum attacks on modern encryption.
• Discovered by Peter Shor in 1994.
—Grover's Algorithm
• Quantum search algorithm for unsorted databases.
• Quadratic speedup compared to classical search.
• Implications for breaking symmetric key cryptography.
• Discovered by Lov Grover in 1996.
Shor's algorithm threatens
Asymmetric Encryption by
efficiently factoring large
numbers, compromising
security.
Grover's algorithm poses a
threat to Symmetric Encryption
by speeding up brute-force
attacks, reducing its
effectiveness.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
11. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Asymmetric Encryption Algorithms
Symmetric Encryption Algorithms
CONTEXT PQC
12. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Asymmetric Encryption Algorithms
• Generally more vulnerable to quantum threats compared to
symmetric encryption algorithms.
• Arises from the fact that many asymmetric encryption algorithms rely
on mathematical problems that can be efficiently solved by quantum
computers
13. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Symmetric Encryption Algorithms
• Considered to be less vulnerable to quantum threats because they do
not rely on the same mathematical problems as asymmetric encryption.
• Typically based on operations such as Permutations, Substitutions,
and Bitwise operations rather than the mathematical problems that
asymmetric encryption algorithms rely on.
14. Thus
• Emergence of Quantum Computing raises concerns about the future
security of blockchain networks relying on traditional cryptographic methods.
• Transitioning to post-quantum cryptographic methods is imperative to
ensure the continued security of digital communication and asset protection
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
15. Foundations of Post
Quantum Cryptography
(PQC)
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
16. Foundations of Post
Quantum Cryptography
(PQC) • Quantum cryptography relies on the
principles of quantum mechanics to
secure communication channels.
• Unlike classical cryptography, quantum
cryptography utilizes the behavior of
particles like photons to create secure
communication protocols.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
17. • Qubits
• Superposition
• Entanglement
• Quantum Gates
• Quantum Algorithms
• De-coherence & Error Correction
• Quantum Measurement
Foundations of Post
Quantum Cryptography
(PQC)
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
18. • Qubits: Quantum computing's core, like classical bits
• Superposition: Qubits can represent 0 and 1 simultaneously, boosting computational power.
• Entanglement: Qubits can be correlated regardless of distance, enhancing computational capabilities.
• Quantum Gates: Manipulate qubits to perform operations like classical logic gates.
• Quantum Algorithms: Leverage qubits to solve problems exponentially faster than classical methods.
• De-coherence & Error Correction: Techniques counteract errors caused by environmental factors.
• Quantum Measurement: Process collapses qubit states, providing classical output from quantum
computations.
Foundations of PQC
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
19. • In the world of computers, information is built on bits, tiny switches that are either on (1) or off (0).
• Quantum computers take things a step further with qubits. These are like bits, but weirder.
• A qubit can be 1, 0, or both at the same time (superposition), thanks to the strangeness of quantum
mechanics. Imagine a coin spinning – it's both heads and tails until you stop it and look.
• This lets qubits explore many possibilities simultaneously, making them supercharged for tackling
problems that would take regular computers forever.
• Here's the catch: qubits are delicate. Measuring them forces them to be a 1 or 0, collapsing their
superposition. But if we can harness them, they hold immense potential for revolutionizing fields like
medicine, materials science, and cryptography. Think of it as unlocking a whole new way of processing
information, with qubits as the key.
QUBITS
20. • Qubits vs Bits: Qubits, the building blocks of quantum computers, differ from classical bits. While bits
are restricted to 0 or 1, qubits can be in a superposition of both states at once.
• Superposition Explained: This "both-at-once" state arises from quantum mechanics. Mathematically, a
qubit's state is a combination of |0> and |1> with probabilities encoded by complex numbers (amplitudes).
• Basis States: The |0> and |1> states are the foundation for qubits. They act as reference points for
describing more complex quantum states.
• Bloch Sphere Visualization: This mathematical tool depicts a qubit's state as a point on a sphere. The
position depends on the amplitudes associated with the basis states.
• Parallel Processing Power: Superposition allows multiple qubits to explore numerous possibilities
simultaneously. This unlocks the ability to tackle problems that would overwhelm classical computers.
• Fragile Nature: Measuring a qubit forces it to collapse into a definite state (0 or 1), destroying the
superposition. Careful control is needed to harness its potential.
SUPERPOSITION
21. • Twin Qubits: Imagine two qubits linked like twins. This is entanglement, where their fates are
connected.
• Instantaneous Connection: A change in one entangled qubit instantly affects the other, no matter the
distance. (Think: Separated coins flipping the same way every time!)
• Not Teleportation: Entanglement doesn't transmit information faster than light, but allows for powerful
correlations in quantum algorithms.
• Beyond Bits: Unlike classical bits, entangled qubits share a single quantum state, defying classical
physics.
• Unlocking Potential: Entanglement holds promise for secure communication and solving complex
problems in various fields.
ENTANGLEMENT: SPOOKY ACTION AT A DISTANCE
22. • The Tools of the Trade: Quantum gates are like logic gates in classical computers, but for qubits. They
manipulate the superposition and entanglement of qubits.
• Flipping and Combining: Common gates like Hadamard and CNOT can flip a qubit's state (0 to 1 or
vice versa) or combine the states of two entangled qubits.
• Building Quantum Circuits: By combining different gates in specific sequences, we create quantum
circuits to perform complex calculations.
• Unlocking Potential: Quantum gates allow us to control and orchestrate the unique properties of
qubits, paving the way for solving problems intractable for classical computers.
• Precision is Key: Quantum gates are delicate, requiring precise control to maintain the fragile quantum
states of qubits.
QUANTUM GATES: THE ARCHITECTS OF QUBIT MAGIC
23. • Beyond Classical Limits: Unlike classical algorithms designed for bits, quantum algorithms leverage
the power of superposition and entanglement.
• Tackling the Intractable: These algorithms can solve certain problems exponentially faster than
classical computers, especially those involving complex optimization or large simulations.
• Famous Examples: Shor's Algorithm could break many encryption standards, while Grover's Algorithm
can speed up search tasks.
• Still Under Development: Quantum algorithms are a young field, constantly evolving and being
optimized for specific tasks.
• The Future is Quantum: Mastering these algorithms will unlock breakthroughs in fields like drug
discovery, materials science, and financial modeling.
QUANTUM ALGORITHMS
24. • Decoherence is the enemy of qubits. It's the loss of their delicate quantum states due to interactions
with the environment, making them behave classically (0 or 1).
• Keeping it Quantum: Quantum error correction fights back. These techniques use multiple qubits to
encode information redundantly, detecting and correcting errors caused by decoherence.
• Like Fort Knox for Qubits: Error correction codes act like shields, protecting the fragile superposition
of qubits during computations.
• The Challenge Remains: Implementing effective error correction requires many extra qubits, making it
a hurdle for large-scale quantum computers.
• The Race is On: Researchers are constantly developing new error correction methods to pave the way
for robust and reliable quantum computations.
DE-COHERENCE & ERROR CORRECTION
25. • Extracting the Unknown: Unlike classical bits, qubits hold probabilistic information. Measurement
aims to extract this information from a qubit (or entangled qubits) existing in superposition (both 0 and 1).
• Superposition Collapse: Measurement forces the "both-at-once" state to collapse. The qubit is forced
into a definite state (0 or 1) – a one-way trip.
• Probabilistic Outcomes: Forget certainties! We only get the probability of finding the qubit in a specific
state (0 or 1) after measurement, based on its wavefunction before.
• The Observer Effect: Measurement requires interaction with a device, disrupting the qubit and forcing
collapse. This interaction highlights how the act of measurement itself influences the system.
• Bridging Two Worlds: Quantum measurement connects the probabilistic world of qubits with the
classical world of definite states. It provides information, but fundamentally alters the measured system.
QUANTUM MEASUREMENT
30. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
[8]: System design has been proposed that schemes a voting system on the
blockchain, incorporating PQC offering a systematic and critical view towards laying
down a quantum-resistant blockchain for near future online voting systems in the
PQC era ahead.
[9] addresses the challenge of collaborating network services with heterogeneous
devices from various vendors by leveraging blockchain technology.
Research also explores the integration of PQC algorithms to safeguard against
future threats and demonstrates superior write performance of Quorum Blockchain
by exploiting PQC algorithm shortest vector problem (SVP) in a lattice.
31. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
[12]: Employs Grobner basis algorithms over finite fields, bidding better security
against possible quantum attacks
Grobner basis algorithms
Special kind of set of polynomials that captures the
essence of a larger set. Like having a bunch of complex
polynomial equations & a Grobner basis renders a
simplified set that holds all the essential
information about the original equations, making it
easier to analyze.
32. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
[12]: Employs Grobner basis algorithms over finite fields, bidding better security
against possible quantum attacks
[13]: Concentrating specifically on Bitcoin & Ethereum, the authors demonstrate how
these platforms enable primitives to ensure data integrity, authenticity, and non-
repudiation and then they acknowledge the potential threat posed by emergent QC
advancements. The authors foresee a future where BCT networks employ NIST-
recommended PQC primitives, ascertaining their continued practicality in the QC era.
33. Primitive Name Vulnerability Quantum Attack Impact on Blockchain Security
Elliptic Curve
Cryptography
Shor's Algorithm
Breaks ECC algorithms used for digital
signatures and key exchange
Loss of transaction integrity, unauthorized access to
funds, and potential manipulation of the ledger
RSA Shor's Algorithm
Breaks RSA algorithms used for digital
signatures and key exchange
Similar impact as ECC
SHA-256 Grover's Algorithm
Enables finding collisions with
considerably less effort
Potential for forging transactions and compromising
data integrity
ECDSA Signatures Shor's Algorithm Breaks ECDSA signature scheme Loss of transaction authenticity and non-repudiation
Merkle Trees Grover's Algorithm
Speeds up finding preimages and
second preimages
Potential for forging transactions and compromising
data integrity
Proof-of-Work Grover's Algorithm
Enables finding solutions to PoW
puzzles with reduced computational
effort
Potential for mining dominance and centralization of
the network
34. Most PQC algorithms base
their security on one or
more of the mathematical
problems
PQC methods with
different mathematical
foundations
Lattice Based
Code Based
Multivariate
Polynomial
Hash Based
Isogeny Based
Post-Quantum
Key Exchange
Hybrid
Cryptographic
Schemes
Super-Singular
Elliptic Curve
35. Most PQC algorithms base
their security on one or
more of the mathematical
problems
Lattice Based
Code Based
Multivariate
Polynomial
Hash Based
Isogeny Based
Post-Quantum
Key Exchange
Hybrid
Cryptographic
Schemes
Super-Singular
Elliptic Curve
PQC methods that are to be
taken seriously belong to 5
families that differ in
mathematical foundations
36. • Building with Lattices: This approach leverages mathematical structures called lattices – grids of
points formed by integer combinations of vectors.
• Hard Problems, Secure Keys: The security of lattice-based PQC relies on the difficulty of solving
specific lattice problems in polynomial time, even for quantum computers. Think complex mazes with no
easy escape!
• Encryption & Signatures: Lattice-based schemes offer both encryption and digital signature
functionalities, crucial for secure communication and data integrity in the quantum age.
• Standardization on the Horizon: Promising lattice-based PQC algorithms like CRYSTALS-KYBER and
CRYSTALS-Dilithium are undergoing standardization, paving the way for real-world adoption.
LATTICE IS SPECIAL TODAY
37. Approaches of Post Quantum Cryptography
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Based on Description TRL
Lattice Based Mathematical structures based on grids of points and Defined by basis
vectors
4
Code Based Relies on error-correcting codes for its security 3
Multivariate Polynomial Employs systems of polynomial equations for cryptographic security. 2
Hash Based Leverages the collision resistance 4
Isogeny Based Involves the complexity of computing isogenies between elliptic curves. 5
38. Primitive Name Potential Post-Quantum Replacement Algorithm
Elliptic Curve Cryptography
Lattice-based cryptography, multivariate cryptography, Supersingular
Isogeny Diffie-Hellman (SIDH)
RSA
Lattice-based cryptography, multivariate cryptography, post-quantum RSA
(PQ-RSA)
SHA-256 Quantum-resistant Merkle trees
ECDSA Signatures Lattice-based signatures, multivariate signatures, XMSS
Merkle Trees
Quantum-resistant Merkle trees with alternative collision-resistant hash
functions
Proof-of-Work
Quantum-resistant PoW algorithms, post-quantum consensus
mechanisms
Potential Post-Quantum Replacement Algorithm
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
39. Mechanism Name Latency Throughput
Energy
Consumption
Scalability
Suitability for Different Blockchain Use
Cases
Lattice-based Moderate Moderate High Good
Suitable for public and permissioned
blockchains
Multivariate BFT Low Moderate Low Good
Suitable for resource-constrained private
blockchains
Isogeny Moderate High Moderate Good
Suitable for high-throughput applications
and public blockchains
Hash-based Low Moderate Low Good
Suitable for private blockchains requiring
fast consensus
Quantum-resistant
Proof of Work (PoW)
High Low High Moderate
Suitable for public blockchains requiring
high security and decentralization
Quantum-resistant
Proof of Stake (PoS)
Moderate Moderate Low Good
Suitable for public and permissioned
blockchains
PQC MECHANISMS: PERFORMANCE & SUITABILITY FOR BLOCKCHAIN
45. NIST chose four finalist algorithms in July 2022 for post-quantum cryptography.
The fourth standard (FALCON) will release its draft for comments in 2024.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
CRYSTALS-Kyber : Lattice method for asymmetric encryption.
CRYSTALS-Dilithium : Lattice method, it is used for digital signature.
FALCON : Signature method is also based on lattices.
SPHINCS+ : Hash-based SPHINCS+ is another signature method
NIST also identified many additional candidates to be evaluated which also include non-lattice-based
choices.
46. NIST chose four finalist algorithms in July 2022 for post-quantum cryptography.
The fourth standard (FALCON) will release its draft for comments in 2024.
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
CRYSTALS-Kyber : Lattice method for asymmetric encryption.
CRYSTALS-Dilithium : Lattice method, it is used for digital signature.
FALCON : Signature method is also based on lattices.
SPHINCS+ : Hash-based SPHINCS+ is another signature method
NIST also identified many additional candidates to be evaluated which also include non-lattice-based
choices.
47. In addition to NIST, German federal office BSI recommends two PQC models
• Classic McEliece
• FrodoKEM
IETF has proposed two hash based models
• XMSS (RFC 8391)
• Leighton-Micali (RFC 8554)
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
48. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Literature Review Summary
- 15 Papers explored with Lattice based PQC in maximum
- Voting enabled on blockchain applications
- Max demonstrations limited to Ethereum blockchain and few on Quoram
- QKD for Quantum-Safe Smart Contracts
- Mostly Theoretical frameworks
- Lack of Quantum research resources
- Promising and Definite association of Blockchain and PQC
- Threats and repercussions to Smart Contracts
- Existing Governance Mechanisms in place
50. Challenges of Implementing PQC in Blockchain
— Performance and Efficiency
• PQC algorithms demand more computation, potentially slowing down blockchain platforms.
— Interoperability and Compatibility
• Integrating PQC requires major updates to blockchain protocols for compatibility with existing systems.
• Lack of standardized PQC algorithms can lead to compatibility issues across blockchain platforms.
— Security Considerations in Transitioning to PQC
• PQC implementations are vulnerable to side-channel attacks.
— Migration
• Likewise for any migration in PQC by NIST, there exists a number of challenges
—Current Chip Architectures
• Current card chip architectures are designed for RSA or Diffie-Hellman keys and have a corresponding coprocessor.
• In contrast, they are not designed to perform lattice or, code operations, certainly not with the necessary key lengths.
• Revision of current chip architectures is therefore an important challenge for the coming years
InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
51. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
Conclusion
• Solution without a problem
• Cryptoagility
• Ability of a cryptographic system to rapidly adapt and evolve in response to new
threats, vulnerabilities, or technological advancements
• Realisation of threat by state
• Harvest now Decrypt Later
• Blockchain future readiness imminent
• AI arrival spoils the scenario further
52. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
1. H. A. Bhat, F. A. Khanday, B. K. Kaushik, F. Bashir and K. A. Shah, "Quantum Computing: Fundamentals, Implementations and Applications," in IEEE Open Journal
of Nanotechnology, vol. 3, pp. 61-77, 2022, doi: 10.1109/OJNANO.2022.3178545.
2. Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," 2017 IEEE International
Congress on Big Data (BigData Congress), Honolulu, HI, USA, 2017, pp. 557-564, doi: 10.1109/BigDataCongress.2017.85.
3. A. Khalid, S. McCarthy, M. O’Neill and W. Liu, "Lattice-based Cryptography for IoT in A Quantum World:Are We Ready?," 2019 IEEE 8th International Workshop on
Advances in Sensors and Interfaces (IWASI), Otranto, Italy, 2019, pp. 194-199, doi: 10.1109/IWASI.2019.8791343.
4. A. Kuznetsov, A. Kiian, M. Lutsenko, I. Chepurko and S. Kavun, "Code-based cryptosys-tems from NIST PQC," 2018 IEEE 9th International Conference on
Dependable Systems, Services and Technologies (DESSERT), Kyiv, UKraine, 2018, pp. 282-287, doi: 10.1109/DESSERT.2018.8409145.
5. A. C. H. Chen, "Post-Quantum Cryptography Neural Network," 2023 International Confe-rence on Smart Systems for applications in Electrical Sciences
(ICSSES),Tumakuru, India, 2023, pp. 1-6, doi: 10.1109/ICSSES58299.2023.10201083.
6. A. Albuainain, J. Alansari, S. Alrashidi, W. Alqahtani, J. Alshaya and N. Nagy, "Experi-mental Implementation of Shor's Quantum Algorithm to Break RSA," 2022 14th
International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 2022, pp. 748-752,
doi:10.1109/CICN56167.2022.10008287.
7. A. Mandviwalla, K. Ohshiro and B. Ji, "Implementing Grover’s Algorithm on the IBM
Quantum Computers," 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 2531-2537, doi: 10.1109/BigData.2018.8622457.
8. S. Gupta, K. K. Gupta, P. K. Shukla and M. K. Shrivas, "Blockchain-based Voting System Powered by Post-Quantum Cryptography (BBVSP-PQC)," 2022 Second
International Conference on Power, Control and Computing Technologies (ICPC2T), Rai-pur, India, 2022, pp. 1-8, doi: 10.1109/ICPC2T53885.2022.9776966.
9. E. Zeydan, J. Baranda and J. Mangues-Bafalluy, "Post-Quantum Blockchain-Based Secure Service Orchestration in Multi-Cloud Networks," in IEEE Access, vol. 10,
pp. 129520-129530, 2022, doi: 10.1109/ACCESS.2022.3228823.
10. Allende, M. et al. (2023) ‘Quantum-resistance in Blockchain Networks’, Scientific Reports, 13(1). doi:10.1038/s41598-023-32701-6.
11. T. M. Fernández-Caramès and P. Fraga-Lamas, "Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing
Attacks," in IEEE Access, vol. 8, pp. 21091-21116, 2020, doi: 10.1109/ACCESS.2020.2968985.
12. J. Chen, W. Gan, M. Hu and C. -M. Chen, "On the Construction of a Post-Quantum Block-chain," 2021 IEEE Conference on Dependable and Secure Computing
(DSC), Aizuwakamatsu, Fukushima, Japan, 2021, pp. 1-8, doi: 10.1109/DSC49826.2021.9346253.
References
53. InternationalConference on Recent Developments in Cyber Security- ReDCySec-2024
13. A. H. Lone and R. Naaz, "Demystifying Cryptography behind Blockchains and a Vision for Post-Quantum Blockchains," 2020 IEEE International Conference for
Innovation in Technology (INOCON), Bangluru, India, 2020, pp. 1-6, doi:
10.1109/INOCON50539.2020.9298215.
14. K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto and T. Schroeter, "Blockchained Post-Quantum Signatures," 2018 IEEE International Conference on Internet
of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), Halifax, NS, Canada, 2018, pp. 1196-1203, doi: 10.1109/Cybermatics_2018.2018.00213.
15. Xu, S., Sun, A., Ren, Z. et al. Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. J Comb Optim 45,
116 (2023). https://doi.org/10.1007/s10878-023-01047-0
16. Gharavi, H. (2023) ‘Post Quantum Blockchain Security for the internet of things survey and research directions’, JOURNAL OF IEEE COMMUNICATIONS
SURVEYS & TUTORIALS [Preprint]. doi:10.36227/techrxiv.22821692.v1.
17. Buser, M. et al. (2023) ‘A survey on exotic signatures for Post-quantum Blockchain: Challenges and research directions’, ACM Computing Surveys, 55(12), pp. 1–32.
doi:10.1145/3572771.
18. R. Saha et al., "A Blockchain Framework in Post-Quantum Decentralization," in IEEE Transactions on Services Computing, vol. 16, no. 1, pp. 1-12, 1 Jan.-Feb.
2023, doi: 10.1109/TSC.2021.3116896.
19. Seok, B.; Park, J.; Park, J.H. A Lightweight Hash-Based BlockchainArchitecture for Indus-trial IoT. Appl. Sci. 2019, 9, 3740. https://doi.org/10.3390/app9183740
20. Zijlstra, T. (2020) Secure hardware accelerators for Post Quantum Cryptography, theses. Available at: https://theses.hal.science/tel-02953277v1 (Accessed: 09 Dec
2023).
21. X. Yang, B. Li, Y. Zhang, J. Wu and P. Yuan, "A Hybrid Blockchain-BasedAuthentication Scheme for Smart Home," 2020 IEEE 5th International Conference on
Signal and Image Processing (ICSIP), Nanjing, China, 2020, pp. 893-897, doi: 10.1109/ICSIP49896.2020.9339278.
22. Teague, T. (2022) University of Arkansas, Fayetteville scholarworks@uark, https://scholarworks.uark.edu/.Available at:
https://scholarworks.uark.edu/cgi/viewcontent.cgi?article=1106&context=csceuht (Ac-cessed: 09 December 2023).
23. Swayne, M. (2024) Blockchain, Quantum Experts Develop Framework to Keep Blockchain Safe from Quantum Computers.
https://thequantuminsider.com/2023/05/02/blockchain-quantum-experts-develop-framework-to-keep-blockchain-safe-from-quantum-computers/.
24. Chik, H. and Chik, H. (2022) 'Chinese blockchain platform ChainMaker says it has new technology to keep it secure from quantum attacks,' South China Morning
Post, 9 June. https://www.scmp.com/news/china/science/article/3180884/chinese-blockchain-platform-chainmaker-says-it-has-new.
25. Dargan, J. (2024) BTQ & ITRI announce collaboration to develop next-generation semiconductor technology for post-quantum cryptography.
https://thequantuminsider.com/2022/09/07/btq-itri-announce-collaboration-to-develop-next-generation-semiconductor-technology-for-post-quantum-cryptography/.
References