Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
by
Alhomoud, Ahmed
, Singh, Sunil K.
, Kumar, Sudhakar
, Attar, Razaz Waheeb
, Gupta, Savita
, Arya, Varsha
, Gupta, Brij B.
, Singh, Manraj
in
Algorithms
/ Control systems
/ Critical infrastructure
/ Cryptography
/ Cybersecurity
/ Effectiveness
/ Hash based algorithms
/ Integrity
/ Machine learning
/ Quantum computing
/ Software
/ Supervisory control and data acquisition
/ Threat evaluation
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
by
Alhomoud, Ahmed
, Singh, Sunil K.
, Kumar, Sudhakar
, Attar, Razaz Waheeb
, Gupta, Savita
, Arya, Varsha
, Gupta, Brij B.
, Singh, Manraj
in
Algorithms
/ Control systems
/ Critical infrastructure
/ Cryptography
/ Cybersecurity
/ Effectiveness
/ Hash based algorithms
/ Integrity
/ Machine learning
/ Quantum computing
/ Software
/ Supervisory control and data acquisition
/ Threat evaluation
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
by
Alhomoud, Ahmed
, Singh, Sunil K.
, Kumar, Sudhakar
, Attar, Razaz Waheeb
, Gupta, Savita
, Arya, Varsha
, Gupta, Brij B.
, Singh, Manraj
in
Algorithms
/ Control systems
/ Critical infrastructure
/ Cryptography
/ Cybersecurity
/ Effectiveness
/ Hash based algorithms
/ Integrity
/ Machine learning
/ Quantum computing
/ Software
/ Supervisory control and data acquisition
/ Threat evaluation
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
Journal Article
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
2025
Request Book From Autostore
and Choose the Collection Method
Overview
As quantum computing continues to advance, traditional cryptographic methods are increasingly challenged, particularly when it comes to securing critical systems like Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential for monitoring and controlling industrial operations, making their security paramount. A key threat arises from Shor’s algorithm, a powerful quantum computing tool that can compromise current hash functions, leading to significant concerns about data integrity and confidentiality. To tackle these issues, this article introduces a novel Quantum-Resistant Hash Algorithm (QRHA) known as the Modular Hash Learning Algorithm (MHLA). This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques, enhancing its overall security framework. Our research delves into the effectiveness of MHLA in defending against both traditional and quantum-based threats, with a particular emphasis on its resilience to Shor’s algorithm. The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology. By ensuring that sensitive data remains protected and confidential, MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantum threats. Our evaluation demonstrates that MHLA improves security by 38% against quantum attack simulations compared to traditional hash functions while maintaining a computational efficiency of O(m · n · k + v + n). The algorithm achieved a 98% success rate in detecting data tampering during integrity testing. These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies. This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape, ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk.
Publisher
Tech Science Press
This website uses cookies to ensure you get the best experience on our website.