,vi
Cyber Security and
Digital Forensics
, Contents vii
1.5 Major Security Issues in Service-Oriented IoT Architecture 31
1.5.1 Application – Interface Layer 32
1.5.2 Service Layer 33
1.5.3 Network Layer 33
1.5.4 Sensing Layer 34
1.6 Conclusion 35
References 36
2 Quantum and Post-Quantum Cryptography 45
Om Pal, Manoj Jain, B.K. Murthy and Vinay Thakur
2.1 Introduction 46
2.2 Security of Modern Cryptographic Systems 46
2.2.1 Classical and Quantum Factoring of A Large
Number 47
2.2.2 Classical and Quantum Search of An Item
49
2.3 Quantum Key Distribution 49
2.3.1 BB84 Protocol 50
2.3.1.1 Proposed Key Verification Phase for BB84 51
2.3.2 E91 Protocol 51
2.3.3 Practical Challenges of Quantum Key
Distribution 52
2.3.4 Multi-Party Quantum Key Agreement Protocol
53
2.4 Post-Quantum Digital Signature 53
2.4.1 Signatures Based on Lattice Techniques 54
2.4.2 Signatures Based on Multivariate Quadratic
Techniques 55
2.4.3 Hash-Based Signature Techniques 55 2.5
Conclusion and Future Directions 55
References 56
3 Artificial Neural Network Applications in Analysis
of Forensic Science 59
K.R. Padma and K.R. Don
3.1 Introduction 60
3.2 Digital Forensic Analysis Knowledge 61
3.3 Answer Set Programming in Digital Investigations 61
3.4 Data Science Processing with Artificial Intelligence Models
63
, viii
3.5
Pattern Recognition Techniques 63
3.6
ANN Applications 65
3.7
Knowledge on Stages of Digital Forensic Analysis 65
3.8
Deep Learning and Modelling 67
3.9
Conclusion 68 References 69 4 A Comprehensive
Survey of Fully Homomorphic Encryption
from Its Theory to Applications 73
Rashmi Salavi, Dr. M. M. Math and Dr. U. P. Kulkarni
4.1 Introduction 73
4.2 Homomorphic Encryption Techniques 76
4.2.1 Partial Homomorphic Encryption Schemes 77
4.2.2 Fully Homomorphic Encryption Schemes 78
4.3 Homomorphic Encryption Libraries 79
4.4 Computations on Encrypted Data 83
4.5 Applications of Homomorphic Encryption 85
4.6 Conclusion 86
References 87
5 Understanding Robotics through Synthetic Psychology 91
Garima Saini and Dr. Shabnam
5.1 Introduction 91
5.2 Physical Capabilities of Robots 92
5.2.1 Artificial Intelligence and Neuro Linguistic
Programming (NLP) 93
5.2.2 Social Skill Development and Activity Engagement
93
5.2.3 Autism Spectrum Disorders 93
5.2.4 Age-Related Cognitive Decline and Dementia 94
5.2.5 Improving Psychosocial Outcomes through Robotics
94
5.2.6 Clients with Disabilities and Robotics 94
5.2.7 Ethical Concerns and Robotics 95
5.3 Traditional Psychology, Neuroscience and Future Robotics
95
5.4 Synthetic Psychology and Robotics: A Vision of the Future
97
5.5 Synthetic Psychology: The Foresight 98
5.6 Synthetic Psychology and Mathematical Optimization 99
5.7 Synthetic Psychology and Medical Diagnosis 99
5.7.1 Virtual Assistance and Robotics 100
5.7.2 Drug Discovery and Robotics 100
Cyber Security and
Digital Forensics
, Contents vii
1.5 Major Security Issues in Service-Oriented IoT Architecture 31
1.5.1 Application – Interface Layer 32
1.5.2 Service Layer 33
1.5.3 Network Layer 33
1.5.4 Sensing Layer 34
1.6 Conclusion 35
References 36
2 Quantum and Post-Quantum Cryptography 45
Om Pal, Manoj Jain, B.K. Murthy and Vinay Thakur
2.1 Introduction 46
2.2 Security of Modern Cryptographic Systems 46
2.2.1 Classical and Quantum Factoring of A Large
Number 47
2.2.2 Classical and Quantum Search of An Item
49
2.3 Quantum Key Distribution 49
2.3.1 BB84 Protocol 50
2.3.1.1 Proposed Key Verification Phase for BB84 51
2.3.2 E91 Protocol 51
2.3.3 Practical Challenges of Quantum Key
Distribution 52
2.3.4 Multi-Party Quantum Key Agreement Protocol
53
2.4 Post-Quantum Digital Signature 53
2.4.1 Signatures Based on Lattice Techniques 54
2.4.2 Signatures Based on Multivariate Quadratic
Techniques 55
2.4.3 Hash-Based Signature Techniques 55 2.5
Conclusion and Future Directions 55
References 56
3 Artificial Neural Network Applications in Analysis
of Forensic Science 59
K.R. Padma and K.R. Don
3.1 Introduction 60
3.2 Digital Forensic Analysis Knowledge 61
3.3 Answer Set Programming in Digital Investigations 61
3.4 Data Science Processing with Artificial Intelligence Models
63
, viii
3.5
Pattern Recognition Techniques 63
3.6
ANN Applications 65
3.7
Knowledge on Stages of Digital Forensic Analysis 65
3.8
Deep Learning and Modelling 67
3.9
Conclusion 68 References 69 4 A Comprehensive
Survey of Fully Homomorphic Encryption
from Its Theory to Applications 73
Rashmi Salavi, Dr. M. M. Math and Dr. U. P. Kulkarni
4.1 Introduction 73
4.2 Homomorphic Encryption Techniques 76
4.2.1 Partial Homomorphic Encryption Schemes 77
4.2.2 Fully Homomorphic Encryption Schemes 78
4.3 Homomorphic Encryption Libraries 79
4.4 Computations on Encrypted Data 83
4.5 Applications of Homomorphic Encryption 85
4.6 Conclusion 86
References 87
5 Understanding Robotics through Synthetic Psychology 91
Garima Saini and Dr. Shabnam
5.1 Introduction 91
5.2 Physical Capabilities of Robots 92
5.2.1 Artificial Intelligence and Neuro Linguistic
Programming (NLP) 93
5.2.2 Social Skill Development and Activity Engagement
93
5.2.3 Autism Spectrum Disorders 93
5.2.4 Age-Related Cognitive Decline and Dementia 94
5.2.5 Improving Psychosocial Outcomes through Robotics
94
5.2.6 Clients with Disabilities and Robotics 94
5.2.7 Ethical Concerns and Robotics 95
5.3 Traditional Psychology, Neuroscience and Future Robotics
95
5.4 Synthetic Psychology and Robotics: A Vision of the Future
97
5.5 Synthetic Psychology: The Foresight 98
5.6 Synthetic Psychology and Mathematical Optimization 99
5.7 Synthetic Psychology and Medical Diagnosis 99
5.7.1 Virtual Assistance and Robotics 100
5.7.2 Drug Discovery and Robotics 100