International Conference on Artificial Intelligence and Cybersecurity

Prodipto Das Profile

Prodipto Das

Prodipto Das

Biography

He has received M.Sc. Integrated course in Computer Science and Ph.D. from Assam University (a Central University) in 2003 and 2011 respectively. He received M. Tech. in Computer Science & Engineering from Mizoram University (a Central University) in 2021. He received a Post Graduate course in Cyber Law in 2022 from IGNOU. Currently, he is working as Professor in the Department of Computer Science, Assam University, Silchar. He has joined the service of Assam University in 2008. Before that he worked as Assistant Professor in Mizoram University 2007-2008, Lecturer in Tripura University 2006-2007 and Faculty Associate in ICFAI University 2005-2006. Since 2011, he is involved in research work and published 45 journal papers, 4 books, 27 conference papers, 25 book chapters and one patent. He supervised 8 Ph.D?s and 1 M.Phil  scholars so far. He attended many national & international conferences in India and abroad. Among many organised events, he remarkably organised one national conference CTCS 2010, one national workshop with ISI Kolkata (2016) and two international conference AMRIT 2023 and AMRIT 2024 as Organising Secretary. He delivered 34 lecturers in various international and national events as Invited Speaker. His area of research includes Mobile Computing, Adhoc Networks (MANET, VANET), Cloud Computing, AI/ML and Quantum Cryptography. 

He is presently working as Head of the Department of Computer Science at Assam University, Silchar. He also holds a statutory post of Assam University as Proctor since April, 2024. He is the Nodal Officer and SPOC of Assam University SWAYAM Local Chapter since July 2017.

Research Interest

Mobile Computing, Adhoc Networks (MANET, VANET), Cloud Computing, AI/ML and Quantum Cryptography.

Abstract

Quantum Implementation of SHA-1 and MD5 with three other Quantum Resistant Techniques This paper presents the quantum adaptation of Secure Hash Algorithm 1 (SHA-1) and Message Digest 5 (MD5) using IBM?s Qiskit framework, evaluating their computational performance against classical hashing techniques and post-quantum cryptographic schemes, including eXtended Merkle Signature Scheme (XMSS), Leighton-Micali Signature Scheme (LMSS), and SHAKE-256. These three algorithms are the NIST certified quantum resistant hashing techniques. Several quantum circuits are designed to implement fundamental cryptographic operations such as XOR, AND, OR, addition, and modular arithmetic, enabling a quantum-friendly transformation of these hashing algorithms. Experimental results indicate that quantum implementations exhibit significant computational overhead due to circuit depth, gate constraints, and hardware limitations. These findings contribute to understanding the feasibility of quantum hashing and post-quantum cryptographic frameworks and their role in securing future authentication systems. Keywords: Quantum Resistant Hashing Algorithms, Post Quantum Cryptography, SHA-1, MD5, XMSS, LMSS, SHAKE-256