The use of this site and the content contained therein is governed by the Terms of Use. When you use this site you acknowledge that you have read the Terms of Use and that you accept and will be bound by the terms hereof and such terms as may be modified from time to time.
All text, graphics, audio, design and other works on the site are the copyrighted works of nasscom unless otherwise indicated. All rights reserved.
Content on the site is for personal use only and may be downloaded provided the material is kept intact and there is no violation of the copyrights, trademarks, and other proprietary rights. Any alteration of the material or use of the material contained in the site for any other purpose is a violation of the copyright of nasscom and / or its affiliates or associates or of its third-party information providers. This material cannot be copied, reproduced, republished, uploaded, posted, transmitted or distributed in any way for non-personal use without obtaining the prior permission from nasscom.
The nasscom Members login is for the reference of only registered nasscom Member Companies.
nasscom reserves the right to modify the terms of use of any service without any liability. nasscom reserves the right to take all measures necessary to prevent access to any service or termination of service if the terms of use are not complied with or are contravened or there is any violation of copyright, trademark or other proprietary right.
From time to time nasscom may supplement these terms of use with additional terms pertaining to specific content (additional terms). Such additional terms are hereby incorporated by reference into these Terms of Use.
Disclaimer
The Company information provided on the nasscom web site is as per data collected by companies. nasscom is not liable on the authenticity of such data.
nasscom has exercised due diligence in checking the correctness and authenticity of the information contained in the site, but nasscom or any of its affiliates or associates or employees shall not be in any way responsible for any loss or damage that may arise to any person from any inadvertent error in the information contained in this site. The information from or through this site is provided "as is" and all warranties express or implied of any kind, regarding any matter pertaining to any service or channel, including without limitation the implied warranties of merchantability, fitness for a particular purpose, and non-infringement are disclaimed. nasscom and its affiliates and associates shall not be liable, at any time, for any failure of performance, error, omission, interruption, deletion, defect, delay in operation or transmission, computer virus, communications line failure, theft or destruction or unauthorised access to, alteration of, or use of information contained on the site. No representations, warranties or guarantees whatsoever are made as to the accuracy, adequacy, reliability, completeness, suitability or applicability of the information to a particular situation.
nasscom or its affiliates or associates or its employees do not provide any judgments or warranty in respect of the authenticity or correctness of the content of other services or sites to which links are provided. A link to another service or site is not an endorsement of any products or services on such site or the site.
The content provided is for information purposes alone and does not substitute for specific advice whether investment, legal, taxation or otherwise. nasscom disclaims all liability for damages caused by use of content on the site.
All responsibility and liability for any damages caused by downloading of any data is disclaimed.
nasscom reserves the right to modify, suspend / cancel, or discontinue any or all sections, or service at any time without notice.
For any grievances under the Information Technology Act 2000, please get in touch with Grievance Officer, Mr. Anirban Mandal at data-query@nasscom.in.
Introduction to Quantum Mechanics and Quantum Computing:
Quantum computing, unlike classical computing, relies on principles of quantum mechanics. Traditional computers use bits (0 or 1) for processing, while quantum computers use qubits. Qubits can be both 0 and 1 simultaneously, due to superposition. Another fundamental concept is entanglement, which allows qubits to be interconnected, making the state of one qubit dependent on another. Quantum gates manipulate qubits, providing a basis for quantum algorithms and computations.
Quantum Mechanics 101 — The Recollection:
Try recollecting terms like Pauli’s exclusion principle, The quantum numbers , Principal Quantum Number, Angular Momentum Quantum Number, Magnetic Quantum Number and Spin Quantum Number!
Newtonian Physics: Classical physics, rooted in Newtonian mechanics, depicted a deterministic universe where time and space were absolute. Objects moved according to well-defined laws and phenomena at all scales were believed to follow similar principles.
Einstein and Hamiltonian’s Physics — Time as 4th dimension:
Einstein’s theories of relativity shattered these notions. His Special Relativity, introduced in 1905, posited that time and space are relative and intertwined in a four-dimensional spacetime fabric. It declared that nothing can travel faster than light and as objects approach light speed, time slows down relative to observers at rest.
While Einstein set the stage for a new understanding of the cosmos, another revolution was brewing on the microscopic scale: quantum mechanics. This theory, developed by multiple scientists, including Planck, Bohr and Heisenberg, delved into the bizarre world of atoms and subatomic particles. It introduced concepts like superposition & entanglement.
Superposition: In quantum physics, superposition refers to a quantum system’s ability to exist in multiple states simultaneously. Unlike classical systems, where an object must be in one state or another, a quantum system can be in a blend of states. Only when a measurement is made does the system “collapse” into one of the possible outcomes. For instance, an electron in a magnetic field can have its spin oriented in alignment with the field (described as up) or opposite to the field (described as down). However, quantum mechanics allows the electron to exist in a superposition of both up and down spin states until it is measured.
Entanglement: Entanglement is one of the most mysterious phenomena in quantum mechanics. When two or more particles become entangled, their quantum states become interdependent, meaning the state of one particle is directly related to the state of the other, no matter the distance between them. If you measure the state of one entangled particle, you’ll instantly know the state of the other, even if they are light-years apart. This phenomenon, which Einstein famously called “spooky action at a distance,” challenges our classical intuitions and has profound implications for quantum information and communication.
Together, superposition and entanglement underpin the powerful and non-intuitive behaviors of quantum systems, paving the way for technologies like quantum computing and quantum cryptography.
2. Basics of Cyber security:
Cyber security aims to protect systems, networks and data from cyber threats. Given the digital age’s rise, safeguarding sensitive data from hackers and malicious software is paramount. Techniques such as encryption, where data is translated into a code to prevent unauthorized access, are vital. RSA and ECC are popular cryptographic tools that use hard mathematical problems to ensure security.
3. Quantum Threat to Cryptography:
Quantum computing can challenge existing cryptographic systems. Shor’s algorithm, for instance, when run on a sufficiently advanced quantum computer, can efficiently factor large numbers. This capability threatens RSA encryption, which relies on the difficulty of factoring large prime numbers. Additionally, quantum computers can also potentially undermine ECC by computing discrete logarithms faster than classical machines.
4. Post-Quantum Cryptography:
Anticipating quantum computers’ potential to crack current cryptographic methods, researchers are exploring post-quantum cryptography. This domain aims to design security protocols resilient against quantum attacks. Leading techniques under investigation include lattice-based cryptography, which relies on the difficulty of certain problems in lattice structures and hash-based cryptography, known for its strong security guarantees.
5. Quantum Key Distribution (QKD):
QKD is a method allowing two parties to generate a shared, secret random number, ensuring a new level of security. The fundamental principle is the no-cloning theorem, meaning a quantum state cannot be copied precisely. If an eavesdropper tries to intercept the quantum key, their interference will be detectable, ensuring the key’s integrity.
QKD is a Protocol \ method allowing two parties to generate a shared, secret random number, ensuring a new level of security. The fundamental principle is the no-cloning theorem, meaning a quantum state cannot be copied precisely. If an eavesdropper tries to intercept the quantum key, their interference will be detectable, ensuring the key’s integrity.
QKD is a secure communication method that leverages the principles of quantum mechanics to generate a shared random secret key between two parties ( Alice and Bob) that can be used to encrypt and decrypt messages. The key property of QKD is its ability to detect eavesdropping attempts; if an eavesdropper (often called Eve) tries to intercept the quantum states used for key generation, their presence will disturb the states in a way that is noticeable to Alice and Bob.
Here’s a simplified explanation of how QKD typically works:
Initialization: Alice and Bob agree on a quantum communication channel, typically a fiber-optic link capable of transmitting qubits, as well as a classical communication channel (like a regular phone line or internet connection).
Key Generation:
Alice prepares qubits (quantum bits) in specific quantum states and sends them to Bob over the quantum channel.
Bob measures the received qubits to extract information from them.
Sifting:
After the qubits are sent and measured, Alice and Bob use the classical channel to discuss the results. However, they do not reveal the actual values of the measured bits, only information about which measurements were successful and can be used to generate the key.
Error Rate Estimation:
A subset of the sifted bits is selected to estimate the error rate. If the error rate is above a certain threshold, it is assumed that an eavesdropper might be intercepting, and the process is aborted. Error Correction:
If the error rate is low enough, Alice and Bob proceed to correct any errors in the remaining sifted bits using classical error correction techniques.
Privacy Amplification:
Alice and Bob then apply a process called “privacy amplification” to shorten the key in a way that removes any information an eavesdropper might have gained.
Secure Key:
At the end of this process, both Alice and Bob have identical secret keys that they can use for secure communication over an insecure classical channel.
Quantum Key Distribution is theoretically 100% secure, assuming perfect implementation and adherence to quantum mechanics principles, as per the no-cloning theorem and the Heisenberg uncertainty principle. In practice, however, various imperfections such as loss in the fiber-optic cables, noisy detectors, and other technological limitations can reduce the security. Nonetheless, it offers a higher level of security compared to classical key distribution systems and is a subject of ongoing research and commercialization.
Types of QKD:
Entanglement-Based QKD Protocols:
In entanglement-based Quantum Key Distribution (QKD) protocols, entangled quantum states are used to establish a shared secret key between the sender (often called Alice) and the receiver (often called Bob). The E91 or Ekert91 protocol is a canonical example of this approach. In these protocols, if an eavesdropper tries to intercept the key, the entangled states would be disturbed, and the intrusion can be detected. These protocols often rely on the violation of Bell inequalities to ensure security.
Non-Entanglement-Based QKD Protocols:
Non-entanglement-based protocols, also known as prepare-and-measure protocols, do not rely on entangled states. Instead, the sender prepares quantum states and sends them to the receiver, who measures them to extract a key. BB84 is the pioneering example of a prepare-and-measure QKD protocol. Other examples include B92, SARG04, and Coherent One-Way (COW).
Examples:
Entanglement-Based:
E91 (Ekert91)
MDI-QKD (Measurement-Device-Independent QKD)
DI-QKD (Device-Independent QKD)
Non-Entanglement-Based:
BB84
B92
SARG04
COW (Coherent One-Way)
Both approaches have their advantages and disadvantages in terms of implementation complexity, robustness against attacks, and efficiency. While entanglement-based protocols offer intrinsic security features tied to the entangled states, they are often more challenging to implement due to the requirement of maintaining entanglement. Non-entanglement-based protocols, on the other hand, are generally easier to implement but may require additional steps to ensure security against specific types of attacks.
6. Real-world Applications and Progress:
Quantum computing’s promise in cyber security has led to significant investments by corporations and governments. For instance, several companies are testing QKD in real-world scenarios, exploring its practicality in secure communications. Additionally, advancements in post-quantum cryptography are making their way into industry standards, ensuring future-proof security measures.
7. Challenges and Opportunities:
Though quantum computing offers revolutionary possibilities, challenges like ensuring qubit stability and scalability persist. Current quantum computers are prone to errors due to environmental interferences. However, these challenges present research opportunities. Advancements in error correction and hardware development could pave the way for more robust quantum systems and applications.
8. Conclusion:
Quantum computing is poised to redefine the cyber security landscape. While it presents threats to traditional cryptographic methods, it also offers unparalleled security solutions like QKD. As research advances, the intersection of quantum computing and cyber security promises a shift towards more secure, quantum-resilient cryptographic systems in the digital age.
That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.
NeST Digital, the software arm of the NeST Group, has been transforming businesses, providing customized and innovative software solutions and services for customers across the globe. A leader in providing end-to-end solutions under one roof, covering contract manufacturing and product engineering services, NeST has 25 years of proven experience in delivering industry-specific engineering and technology solutions for customers, ranging from SMBs to Fortune 500 enterprises, focusing on Transportation, Aerospace, Defense, Healthcare, Power, Industrial, GIS, and BFSI domains.
Credential theft has witnessed a meteoric rise in the past couple of years with the surge in remote work. Reports suggest over 4/5th of data breaches resulting from hacking involve the use, or misuse, of lost or stolen credentials.
While the …
SYSTEM BASED ATTACK-RANSOMWARE
Ransomware is a sort of attack that has grown in importance as a danger to both businesses and individuals in the last two years. The majority of contemporary ransomware variations encrypt files on the infected system…
SYSTEM BASED ATTACK- DNS SPOOFING
What is domain name system (DNS) spoofing
Domain Name Server (DNS) spoofing (a.k.a. DNS cache poisoning) is an attack in which altered DNS records are used to redirect online traffic to a fraudulent website that…
WEB BASED ATTACK- PHISHING
What is phishing attack?
Phishing is a type of social engineering assault that is frequently used to obtain sensitive information from users, such as login credentials and credit card details. It happens when a hacker…
Operational technology (OT) cybersecurity includes the processes that involve the discovery, monitoring, and remediation of network-connected OT devices affected by unusual behavior.
OT can be defined as the network-connected devices that monitor…
2022 is all set to be another eventful and somewhat terrifying year, for the entire world, from the growth and security point of view. The new variant of COVID-19 is showing no signs of slowing down, raising complications on subjects like digital…