diff_months: 8

You are to propose and design a model or technological framework for a Quantum Resistance Blockchain Network than that is currently available. Sever

Download Solution Now
Added on: 2024-11-14 03:30:04
Order Code: SA Student Mat Engineering Assignment(3_24_40434_219)
Question Task Id: 502681

Assigned Task

You are to propose and design a model or technological framework for a Quantum Resistance Blockchain Network than that is currently available. Several conversations surround the Digital Signature Algorithm, Public Key Encryption, and Key Established Algorithm. Keep in mind that the current keys utilize

Hash-Based Cryptography

Code Based Cryptography

Lattice-Based Cryptography

Multivariant Cryptography

Explain how your model will encompass and /or enhance the following:

You may utilize a smart contract security

An adaptable system

Minimizing the utilization of an OKD because of its large network qualities

End-to-end encryption framework for post-QC network.

Utilizing asymmetric keys that will not compromise the public key?

Ability to change the data but maintain the hash

Ability to rewrite the past block data?

Generating key based on randomness

Customizing a crypto algorithm certificate of Authority or registration

of an entity.

Before we look at QC, we must examine the following theories.

The Shors Theory in Blockchain (BC) Networks

Peter Shor (1994) developed a Quantum Factorial Algorithm that can undermine the security of widely used asymmetric cryptography schemes. This was a pivotal moment in the quantum blockchain relationship. Most current blockchains are non-QC-resistant crypto algorithms. Shors Factorial Algorithm can compute quantum by factoring numbers exponentially, creating a crypto threat. The advantage is the ability to multiply two large prime numbers, making it difficult to classify, hence its threat to cryptography. Shors factorial algorithm would suggest that public-key encryption systems would be in danger if attackers had access to a potent quantum computer that could conduct decryption without first knowing the private key. In theory, we begin with a rough estimate, h, plus the big number to be factored, N. This initial approximation has a couple of possibilities. In the first scenario, either h constitutes a factor of N,or it has an associated factor with N. Euclid's Algorithm is widely known to utilizemodulo or subtraction to locate common factors. We proceed to improve this prediction if h is neither a factor of N nor shares a common factor. We know that a power p and multiple m exist for any two whole primenumbers, A and B, such that Ap = m B +1 Ap=mB+1. With this estimation, we may express our relationship as hp = mN+1. After deducting 1 from each side, we find that hp 1=mN. Since this is a difference of two squares, we can rephrase this as (h2p+1)(h2p1)=mN. A potential contributing component to N, as we search for the power p. Modular arithmetic is often required to determine the number's period to be factored utilizing Shors QPE (Quantum Phase Estimation). The inverse Quantum Fourier Transform (QFT)iQFT then converts the modular arithmetic's quantum resultinto meaningful information that can be extracted from the quantum circuit.

The Schrdinger Theory in Blockchain (BC) Networks

Another application of quantum computing to blockchain is the development of quantum-secure blockchains. Several projects are actively working on creating these blockchains by incorporating quantum-resistant cryptographic algorithms from their inception, thus ensuring they remain secure in a future where powerful quantum computers exist. These specially designed blockchains aim to withstand attacks from sophisticated adversaries leveraging advanced computational capabilities provided by quantum technology.

The analogy of the Schrdinger equation illustrates the complexities and foundational nature of certain concepts across different scientific and technological disciplines. As the Schrdinger equation is a fundamental tool in quantum mechanics, providing a mathematical framework for understanding particle behavior at atomic and subatomic scales, blockchain technology and governance are crucial in shaping the digital age {28}. In both cases, these concepts form bedrocks that help to comprehend phenomena on their respective scales, from quantum interactions to decentralized digital transactions. Below is an illustration of the equation:

Let describe a physical system's quantum state.may be either a vector or a function. According to the Schrdinger equation, the time evolution of is given by ihtt=Ht,

where H denotes the system's Hamiltonian operator. If H is time-independent, then:

t=exp(-ihtH)(0)The Schrdinger equation makes creating a particular quantum state feasible starting from a quantum state 1.

  • Uploaded By : Pooja Dhaka
  • Posted on : November 14th, 2024
  • Downloads : 0
  • Views : 94

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more