Naya Nagy - Academia.edu (original) (raw)
Papers by Naya Nagy
Journal of computer and communications, 2024
International Journal of Unconventional Computing, 2016
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Dec 4, 2022
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)
Journal of Computer and Communications
Entropy
Quantum computation offers unique properties that cannot be paralleled by conventional computers.... more Quantum computation offers unique properties that cannot be paralleled by conventional computers. In particular, reading qubits may change their state and thus signal the presence of an intruder. This paper develops a proof-of-concept for a quantum honeypot that allows the detection of intruders on reading. The idea is to place quantum sentinels within all resources offered within the honeypot. Additional to classical honeypots, honeypots with quantum sentinels can trace the reading activity of the intruder within any resource. Sentinels can be set to be either visible and accessible to the intruder or hidden and unknown to intruders. Catching the intruder using quantum sentinels has a low theoretical probability per sentinel, but the probability can be increased arbitrarily higher by adding more sentinels. The main contributions of this paper are that the monitoring of the intruder can be carried out at the level of the information unit, such as the bit, and quantum monitoring acti...
Sensors
This paper proposes a perimeter detection scheme based on the quantum physical properties of phot... more This paper proposes a perimeter detection scheme based on the quantum physical properties of photons. Existing perimeter intrusion detection schemes, if using light, rely on the classical properties of light only. Our quantum sensor network uses the quantum property of spatial superposition of photons, meaning that a photon can simultaneously follow two different paths after going through a beam splitter. Using multiple Mach–Zehnder interferometers, an entire web of paths can be generated, such that one single photon occupies them all. If an intruder violates this web in some arbitrary point, the entire photon superposition is destroyed, the photon does not self-interfere any more and this event is detected by measurements. For one single photon, the intruder detection probability is limited theoretically but can be increased arbitrarily with the usage of a sequence of photons. We show both theoretical bounds as well as practical results of the proposed schemes. The practical result...
Quantum Information Processing
Sensors
In today’s digitalized era, the world wide web services are a vital aspect of each individual’s d... more In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits such as stealing users’ personal and sensitive data, which can lead to financial loss, discredit, ransomware, or the spread of malicious infections and catastrophic cyber-attacks such as phishing attacks. Phishing attacks are being recognized as the leading source of data breaches and the most prevalent deceitful scam of cyber-attacks. Artificial intelligence (AI)-based techniques such as machine learning (ML) and deep learning (DL) have proven to be infallible in detecting phishing attacks. Nevertheless, sequential ML can be time intensive and not highly efficient in real-time detection. It can also be incapable of handling vast amounts of data. However, utilizing parallel computing techn...
2018 21st Saudi Computer Society National Computer Conference (NCC), 2018
Nowadays, especially with technology’s fast development and the constant increase of the computat... more Nowadays, especially with technology’s fast development and the constant increase of the computational power, password authentication mechanism is not enough anymore to provide complete protection which makes securing data a harder task every day. This paper aims to implement a strong authentication mechanism with a practical reauthentication technique that answers the research question “how to increase the security of the authentication mechanism without sacrificing convenience?”. The proposed solution is a combination of a text file that the user has to modify, “PassText”, and a one-time password “OTP”. This paper is based on achieving four main solution requirements: convenience, security, cost, and speed. Our proposed solution breaks the rules of security-convenience tradeoff by providing an intelligent authentication combination that provides security and convenience at the same time.
Applied Sciences
Quantum steganography plays a critical role in embedding confidential data into carrier messages ... more Quantum steganography plays a critical role in embedding confidential data into carrier messages using quantum computing schemes. The quantum variant of steganography outperforms its classical counterpart from security, embedding efficiency and capacity, imperceptibility, and time-complexity perspectives. Considerable work has been carried out in the literature focusing on quantum steganography. However, a holistic view of available schemes is missing. This paper provides an overview of latest advances in the field of quantum-steganography and image-steganography schemes. Moreover, the paper includes discussion of improvements made in the aforementioned fields, a brief explanation of the methodologies used for each presented algorithm, and a comparative study of existing schemes.
2018 21st Saudi Computer Society National Computer Conference (NCC), 2018
The paper emphasizes that the precise awareness of information security policy, its aspects and p... more The paper emphasizes that the precise awareness of information security policy, its aspects and practices is a significant point that organizations must pay attention to prevent potential security threats. However, some Saudi organizations lack the security awareness. This paper represents some previous studies that were conducted to evaluate the state of policy and information security awareness and application in a Saudi organization. The paper considers a small Saudi organization to perform a case study, to audit its state and describe the possible risk scenarios that may take place. Most information about the company was gathered by interviewing its CEO. The audit found five possible risk scenarios, named lack of security policy, personal information leakage from the website, the risk of damage of the CEO’s device and two scenarios related to outsourcing companies. The paper provided some recommendations to the audited organization which may serve other organizations that have the same characteristics, which are adopting and documenting a comprehensive security policy and procedures from beginning stages of a company, ensure that the employees are aware of these documents and the required practices to secure sensitive information. In addition, introduce a mechanism to ensure that security controls are met and to secure personal information transmitted over their website and recommending to regularly checks that the website is bugs free. Additionally, recommends considering more security details on the outsourcing contracts and involve a specialized attorney on it. Also, prefer short-term out-sourcing contracts and take possible alternatives third-party companies into consideration as a precaution.
Squiggle data is the numerical output of DNA and RNA sequencing by the Nanopore next generation s... more Squiggle data is the numerical output of DNA and RNA sequencing by the Nanopore next generation sequencing platform. Nanopore sequencing offers expanded applications compared to previous sequencing techniques but produces a large amount of data in the form of current reads over time. The analysis of these reads require more complex and computationally intensive algorithms than previous sequencing technologies. The purpose of this study is to investigate in principle the potential of using quantum computers to speed up Nanopore data analysis. Quantum circuits are designed to extract major features of squiggle current reads. The circuits are analyzed theoretically in terms of size and performance. Practical experiments on IBM QX show the limitations of the state of the art quantum computer to tackle real life squiggle data problems. Nevertheless, pre-processing of the squiggle data using the inverse wavelet transform, as experimented and analyzed in this paper as well, reduces the dim...
Entropy, 2022
This paper studies the effect of quantum computers on Bitcoin mining. The shift in computational ... more This paper studies the effect of quantum computers on Bitcoin mining. The shift in computational paradigm towards quantum computation allows the entire search space of the golden nonce to be queried at once by exploiting quantum superpositions and entanglement. Using Grover’s algorithm, a solution can be extracted in time O(2256/t), where t is the target value for the nonce. This is better using a square root over the classical search algorithm that requires O(2256/t) tries. If sufficiently large quantum computers are available for the public, mining activity in the classical sense becomes obsolete, as quantum computers always win. Without considering quantum noise, the size of the quantum computer needs to be ≈104 qubits.
The aim of quantum key distribution protocols is to establish a secret key among two parties with... more The aim of quantum key distribution protocols is to establish a secret key among two parties with high security confidence. Such algorithms generally require a quantum channel and an authenticated classical channel. This paper presents a totally new perception of communication in such protocols. The quantum communication alone satisfies all needs of array communication between the two parties. Even so, the quantum communication channel does not need to be protected or authenticated whatsoever. As such, our algorithm is a purely quantum key distribution algorithm. The only certain identification of the two parties is through public keys.
It is known that there exist computational problems that can be solved on a parallel computer, ye... more It is known that there exist computational problems that can be solved on a parallel computer, yet are impossible to be solved sequentially. Specifically, no general purpose sequential model of computation, such as the Turing Machine or the Random Access Machine, can simulate a large family of computations (for example, solutions to certain real-time problems), each of which is capable of being carried out readily by a particular parallel computer. We extend the scope of such problems to the class of problems with uncertain time constraints. The first type of time constraints refers to uncertain time requirements on the input data, that is, when and for how long are the input data available. A second type of time constraints refers to uncertain deadlines on when outputs are to be produced. Our main objective is to exhibit computational problems in which it is very difficult to find out (read ‘compute’) what to do and when to do it. Furthermore, problems with uncertain time constrain...
2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017
Current cyber security solutions rely on ever increasing secret keys. The alternative solution to... more Current cyber security solutions rely on ever increasing secret keys. The alternative solution to this trend is to use quantum security schemes. A quantum security scheme insures that there is no mathematical computation that allows for the computation of the key, as it is simply random. The present paper describes a quantum key distribution scheme that exploits correlation between pairs of bits. This new feature has the added quality that the intruder-Eve can be detected even on a qubit that Eve has not tampered with. The security of the protocol can be made arbitrarily high by increasing the safety parameter.
Journal of computer and communications, 2024
International Journal of Unconventional Computing, 2016
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Dec 4, 2022
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)
Journal of Computer and Communications
Entropy
Quantum computation offers unique properties that cannot be paralleled by conventional computers.... more Quantum computation offers unique properties that cannot be paralleled by conventional computers. In particular, reading qubits may change their state and thus signal the presence of an intruder. This paper develops a proof-of-concept for a quantum honeypot that allows the detection of intruders on reading. The idea is to place quantum sentinels within all resources offered within the honeypot. Additional to classical honeypots, honeypots with quantum sentinels can trace the reading activity of the intruder within any resource. Sentinels can be set to be either visible and accessible to the intruder or hidden and unknown to intruders. Catching the intruder using quantum sentinels has a low theoretical probability per sentinel, but the probability can be increased arbitrarily higher by adding more sentinels. The main contributions of this paper are that the monitoring of the intruder can be carried out at the level of the information unit, such as the bit, and quantum monitoring acti...
Sensors
This paper proposes a perimeter detection scheme based on the quantum physical properties of phot... more This paper proposes a perimeter detection scheme based on the quantum physical properties of photons. Existing perimeter intrusion detection schemes, if using light, rely on the classical properties of light only. Our quantum sensor network uses the quantum property of spatial superposition of photons, meaning that a photon can simultaneously follow two different paths after going through a beam splitter. Using multiple Mach–Zehnder interferometers, an entire web of paths can be generated, such that one single photon occupies them all. If an intruder violates this web in some arbitrary point, the entire photon superposition is destroyed, the photon does not self-interfere any more and this event is detected by measurements. For one single photon, the intruder detection probability is limited theoretically but can be increased arbitrarily with the usage of a sequence of photons. We show both theoretical bounds as well as practical results of the proposed schemes. The practical result...
Quantum Information Processing
Sensors
In today’s digitalized era, the world wide web services are a vital aspect of each individual’s d... more In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits such as stealing users’ personal and sensitive data, which can lead to financial loss, discredit, ransomware, or the spread of malicious infections and catastrophic cyber-attacks such as phishing attacks. Phishing attacks are being recognized as the leading source of data breaches and the most prevalent deceitful scam of cyber-attacks. Artificial intelligence (AI)-based techniques such as machine learning (ML) and deep learning (DL) have proven to be infallible in detecting phishing attacks. Nevertheless, sequential ML can be time intensive and not highly efficient in real-time detection. It can also be incapable of handling vast amounts of data. However, utilizing parallel computing techn...
2018 21st Saudi Computer Society National Computer Conference (NCC), 2018
Nowadays, especially with technology’s fast development and the constant increase of the computat... more Nowadays, especially with technology’s fast development and the constant increase of the computational power, password authentication mechanism is not enough anymore to provide complete protection which makes securing data a harder task every day. This paper aims to implement a strong authentication mechanism with a practical reauthentication technique that answers the research question “how to increase the security of the authentication mechanism without sacrificing convenience?”. The proposed solution is a combination of a text file that the user has to modify, “PassText”, and a one-time password “OTP”. This paper is based on achieving four main solution requirements: convenience, security, cost, and speed. Our proposed solution breaks the rules of security-convenience tradeoff by providing an intelligent authentication combination that provides security and convenience at the same time.
Applied Sciences
Quantum steganography plays a critical role in embedding confidential data into carrier messages ... more Quantum steganography plays a critical role in embedding confidential data into carrier messages using quantum computing schemes. The quantum variant of steganography outperforms its classical counterpart from security, embedding efficiency and capacity, imperceptibility, and time-complexity perspectives. Considerable work has been carried out in the literature focusing on quantum steganography. However, a holistic view of available schemes is missing. This paper provides an overview of latest advances in the field of quantum-steganography and image-steganography schemes. Moreover, the paper includes discussion of improvements made in the aforementioned fields, a brief explanation of the methodologies used for each presented algorithm, and a comparative study of existing schemes.
2018 21st Saudi Computer Society National Computer Conference (NCC), 2018
The paper emphasizes that the precise awareness of information security policy, its aspects and p... more The paper emphasizes that the precise awareness of information security policy, its aspects and practices is a significant point that organizations must pay attention to prevent potential security threats. However, some Saudi organizations lack the security awareness. This paper represents some previous studies that were conducted to evaluate the state of policy and information security awareness and application in a Saudi organization. The paper considers a small Saudi organization to perform a case study, to audit its state and describe the possible risk scenarios that may take place. Most information about the company was gathered by interviewing its CEO. The audit found five possible risk scenarios, named lack of security policy, personal information leakage from the website, the risk of damage of the CEO’s device and two scenarios related to outsourcing companies. The paper provided some recommendations to the audited organization which may serve other organizations that have the same characteristics, which are adopting and documenting a comprehensive security policy and procedures from beginning stages of a company, ensure that the employees are aware of these documents and the required practices to secure sensitive information. In addition, introduce a mechanism to ensure that security controls are met and to secure personal information transmitted over their website and recommending to regularly checks that the website is bugs free. Additionally, recommends considering more security details on the outsourcing contracts and involve a specialized attorney on it. Also, prefer short-term out-sourcing contracts and take possible alternatives third-party companies into consideration as a precaution.
Squiggle data is the numerical output of DNA and RNA sequencing by the Nanopore next generation s... more Squiggle data is the numerical output of DNA and RNA sequencing by the Nanopore next generation sequencing platform. Nanopore sequencing offers expanded applications compared to previous sequencing techniques but produces a large amount of data in the form of current reads over time. The analysis of these reads require more complex and computationally intensive algorithms than previous sequencing technologies. The purpose of this study is to investigate in principle the potential of using quantum computers to speed up Nanopore data analysis. Quantum circuits are designed to extract major features of squiggle current reads. The circuits are analyzed theoretically in terms of size and performance. Practical experiments on IBM QX show the limitations of the state of the art quantum computer to tackle real life squiggle data problems. Nevertheless, pre-processing of the squiggle data using the inverse wavelet transform, as experimented and analyzed in this paper as well, reduces the dim...
Entropy, 2022
This paper studies the effect of quantum computers on Bitcoin mining. The shift in computational ... more This paper studies the effect of quantum computers on Bitcoin mining. The shift in computational paradigm towards quantum computation allows the entire search space of the golden nonce to be queried at once by exploiting quantum superpositions and entanglement. Using Grover’s algorithm, a solution can be extracted in time O(2256/t), where t is the target value for the nonce. This is better using a square root over the classical search algorithm that requires O(2256/t) tries. If sufficiently large quantum computers are available for the public, mining activity in the classical sense becomes obsolete, as quantum computers always win. Without considering quantum noise, the size of the quantum computer needs to be ≈104 qubits.
The aim of quantum key distribution protocols is to establish a secret key among two parties with... more The aim of quantum key distribution protocols is to establish a secret key among two parties with high security confidence. Such algorithms generally require a quantum channel and an authenticated classical channel. This paper presents a totally new perception of communication in such protocols. The quantum communication alone satisfies all needs of array communication between the two parties. Even so, the quantum communication channel does not need to be protected or authenticated whatsoever. As such, our algorithm is a purely quantum key distribution algorithm. The only certain identification of the two parties is through public keys.
It is known that there exist computational problems that can be solved on a parallel computer, ye... more It is known that there exist computational problems that can be solved on a parallel computer, yet are impossible to be solved sequentially. Specifically, no general purpose sequential model of computation, such as the Turing Machine or the Random Access Machine, can simulate a large family of computations (for example, solutions to certain real-time problems), each of which is capable of being carried out readily by a particular parallel computer. We extend the scope of such problems to the class of problems with uncertain time constraints. The first type of time constraints refers to uncertain time requirements on the input data, that is, when and for how long are the input data available. A second type of time constraints refers to uncertain deadlines on when outputs are to be produced. Our main objective is to exhibit computational problems in which it is very difficult to find out (read ‘compute’) what to do and when to do it. Furthermore, problems with uncertain time constrain...
2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017
Current cyber security solutions rely on ever increasing secret keys. The alternative solution to... more Current cyber security solutions rely on ever increasing secret keys. The alternative solution to this trend is to use quantum security schemes. A quantum security scheme insures that there is no mathematical computation that allows for the computation of the key, as it is simply random. The present paper describes a quantum key distribution scheme that exploits correlation between pairs of bits. This new feature has the added quality that the intruder-Eve can be detected even on a qubit that Eve has not tampered with. The security of the protocol can be made arbitrarily high by increasing the safety parameter.