Post-Doctoral Research Fellow in Quantum Computing
I am a passionate researcher specializing in Quantum Computing, Algebraic Cryptography, Tropical Algebra, and its applications. My current focus is on chaos-based image encryption techniques that push the boundaries of secure communication.
Quantum computing is a field that uses quantum mechanics to perform calculations that are too complex for classical computers. It harnesses quantum phenomena like superposition (a qubit can be both 0 and 1 at the same time) and entanglement to process information, potentially solving problems in fields like drug discovery, materials science, and cryptography exponentially faster than current machines.
Tropical cryptography is a cryptographic approach that uses the algebraic structure of the tropical semiring, a mathematical system in which the usual operations of addition and multiplication are replaced by minimum (or maximum) and addition, respectively. In this context, "addition" refers to the minimum (or maximum) operation, and "multiplication" refers to regular addition. This non-standard algebraic structure has been explored for its potential applications in secure communication and cryptography, offering an alternative to traditional number-theoretic approaches like those based on integer factorization or elliptic curve cryptography. Tropical cryptography uses the properties of tropical semirings to create cryptographic primitives such as encryption schemes, digital signatures, and key exchange protocols. The tropical operations introduce new challenges and opportunities for the design of cryptographic protocols that are resistant to certain types of attacks. While tropical cryptography is a relatively novel field, it provides intriguing possibilities, particularly in the context of algebraic geometry and quantum information theory. Its resilience to certain attacks and its ability to operate efficiently in specific computational settings may lead to new methods of securing communications and storing data, especially in environments where traditional cryptographic methods face limitations. However, tropical cryptography is still an area of ongoing research and development.
Chaotic image encryption is a method of securing digital images using chaotic systems, which are nonlinear dynamic systems that exhibit sensitive dependence on initial conditions. This property, known as chaos, makes the system's behavior unpredictable and difficult to reverse without the exact initial parameters, providing a strong basis for encryption. In chaotic image encryption, the pixel values of an image are transformed through a series of complex, deterministic operations inspired by chaotic maps such as the Logistic map, Henon map, or fractional chaotic maps. The encryption process typically involves two phases: confusion and diffusion. Confusion rearranges the pixel values to obscure the relationship between the plaintext image and its ciphertext. Diffusion spreads the pixel values across the entire image to ensure that a change in one pixel influences the entire image, making it harder to decipher. Chaotic systems are particularly suitable for image encryption because they can produce complex, non-repeating patterns with a small change in initial conditions, enhancing security. Additionally, the pseudorandomness of chaotic sequences makes it difficult for attackers to reverse-engineer the encryption process without knowledge of the secret key. This method is efficient, fast, and can be applied to various image formats, offering strong security for image transmission in fields like digital forensics, medical imaging, and multimedia.
Algebraic music theory is an approach to understanding and analyzing music using concepts from abstract algebra, such as groups, rings, and fields. It applies mathematical structures to describe the relationships between musical elements like notes, chords, and scales. This theory helps formalize and generalize musical concepts in ways that can reveal deeper patterns and connections within music. In algebraic music theory, musical structures are often modeled as mathematical objects. For example, musical intervals, which represent the difference in pitch between two notes, can be studied using group theory, where the group operations correspond to intervallic relationships. A common structure used is the *set theory*, where pitch classes (pitches without regard to octave) are treated as elements of a group. This allows for the analysis of scales and chords in terms of their mathematical properties, such as symmetry and transposition. Other applications of algebraic music theory include understanding harmonic progressions, voice leading, and rhythm through the lens of algebraic operations. By treating musical concepts algebraically, it becomes possible to explore symmetries, transformations, and invariants within music, offering new insights into composition and analysis. This approach not only aids in music theory but also contributes to algorithmic composition, music generation, and computer-assisted music analysis.
Loyola College, Chennai
2016 - 2019
Key Interests: Calculus, Graph theory & Music theory.
University of Madras, Chennai
2019 - 2021
Key Interests: Linear algebra, PDE & Algebraic music theory.
SRM Institute of Science and Technology, Katttankulathur
2022 - 2025
Specialization: Algebraic cryptography & Chaotic image encryption.
Indian Institute of Space Science and Technology, Tiruvananthapuram
2025 - Present
Specialization: Quantum computing.
Here are some moments captured during various conferences and workshops I have attended.
Title: Quantum Computation and Quantum Information, Nielsen and Chuang (2010). Cambridge University Press.
Email: jacksonj.pdf@iist.ac.in
Phone: +91 8072874948
LinkedIn: Profile
GitHub: Projects
Google Scholar: Articles
Instagram: Profile