Muutke küpsiste eelistusi

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto [Pehme köide]

  • Formaat: Paperback / softback, 272 pages, kõrgus x laius x paksus: 234x188x15 mm, kaal: 386 g
  • Ilmumisaeg: 05-Dec-2019
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119618193
  • ISBN-13: 9781119618195
Teised raamatud teemal:
  • Pehme köide
  • Hind: 33,35 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 39,24 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Raamatukogudele
  • Formaat: Paperback / softback, 272 pages, kõrgus x laius x paksus: 234x188x15 mm, kaal: 386 g
  • Ilmumisaeg: 05-Dec-2019
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119618193
  • ISBN-13: 9781119618195
Teised raamatud teemal:

Will your organization be protected the day a quantum computer breaks encryption on the internet?

Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day—HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication—will be virtually useless. . . unless you prepare. 

Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:

  • Gives a simple quantum mechanics primer
  • Explains how quantum computing will break current cryptography
  • Offers practical advice for preparing for a post-quantum world
  • Presents the latest information on new cryptographic methods
  • Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats 

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Introduction xxi
I Quantum Computing Primer
1(126)
1 Introduction to Quantum Mechanics
3(28)
What Is Quantum Mechanics?
3(5)
Quantum Is Counterintuitive
4(1)
Quantum Mechanics Is Real
5(3)
The Basic Properties of Quantum Mechanics
8(19)
Photons and Quantum Mechanics
8(1)
Photoelectric Effect
9(1)
Wave-Particle Duality
10(4)
Probability Principle
14(3)
Uncertainty Principle
17(3)
Spin States and Charges
20(1)
Quantum Tunneling
20(1)
Superposition
21(1)
Observer Effect
22(2)
No-Cloning Theorem
24(1)
Spooky Entanglement
24(1)
Decoherence
25(2)
Quantum Examples in Our World Today
27(1)
For Additional Information
28(1)
Summary
29(2)
2 Introduction to Quantum Computers
31(28)
How Are Quantum Computers Different?
31(13)
Traditional Computers Use Bits
31(2)
Quantum Computers Use Qubits
33(4)
Quantum Computers Are Not Ready for Prime Time Yet
37(1)
Quantum Will Reign Supreme Soon
38(1)
Quantum Computers Improve Qubits Using Error Correction
39(5)
Types of Quantum Computers
44(10)
Superconducting Quantum Computers
44(1)
Quantum Annealing Computers
45(2)
Universal Quantum Computers
47(2)
Topological Quantum Computers
49(1)
Microsoft Majorana Fermion Computers
50(1)
Ion Trap Quantum Computers
51(2)
Quantum Computers in the Cloud
53(1)
Non-U.S. Quantum Computers
53(1)
Components of a Quantum Computer
54(2)
Quantum Software
55(1)
Quantum Stack
55(1)
Quantum National Guidance
56(1)
National Policy Guidance
56(1)
Money Grants and Investments
56(1)
Other Quantum Information Science Besides Computers
57(1)
For More Information
58(1)
Summary
58(1)
3 How Can Quantum Computing Break Today's Cryptography?
59(26)
Cryptography Basics
59(15)
Encryption
59(13)
Integrity Hashing
72(1)
Cryptographic Uses
73(1)
How Quantum Computers Can Break Cryptography
74(9)
Cutting Time
74(2)
Quantum Algorithms
76(3)
What Quantum Can and Can't Break
79(3)
Still Theoretical
82(1)
Summary
83(2)
4 When Will the Quantum Crypto Break Happen?
85(14)
It Was Always "10 Years from Now"
85(1)
Quantum Crypto Break Factors
86(4)
Is Quantum Mechanics Real?
86(1)
Are Quantum Computers Real?
87(1)
Is Superposition Real?
87(1)
Is Peter Shor's Algorithm Real?
88(1)
Do We Have Enough Stable Qubits?
88(1)
Quantum Resources and Competition
89(1)
Do We Have Steady Improvement?
89(1)
Expert Opinions
90(1)
When the Quantum Cyber Break Will Happen
90(5)
Timing Scenarios
90(3)
When Should You Prepare?
93(2)
Breakout Scenarios
95(3)
Stays in the Realm of Nation-States for a Long Time
95(2)
Used by Biggest Companies
97(1)
Mass Proliferation
97(1)
Most Likely Breakout Scenario
97(1)
Summary
98(1)
5 What Will a Post-Quantum World Look Like?
99(28)
Broken Applications
99(15)
Weakened Hashes and Symmetric Ciphers
100(3)
Broken Asymmetric Ciphers
103(1)
Weakened and Broken Random Number Generators
103(1)
Weakened or Broken Dependent Applications
104(10)
Quantum Computing
114(2)
Quantum Computers
114(1)
Quantum Processors
115(1)
Quantum Clouds
115(1)
Quantum Cryptography Will Be Used
116(1)
Quantum Perfect Privacy
116(1)
Quantum Networking Arrives
117(1)
Quantum Applications
117(9)
Better Chemicals and Medicines
118(1)
Better Batteries
118(1)
True Artificial Intelligence
119(1)
Supply Chain Management
120(1)
Quantum Finance
120(1)
Improved Risk Management
120(1)
Quantum Marketing
120(1)
Better Weather Prediction
121(1)
Quantum Money
121(1)
Quantum Simulation
122(1)
More Precise Military and Weapons
122(1)
Quantum Teleportation
122(4)
Summary
126(1)
II Preparing for the Quantum Break
127(104)
6 Quantum-Resistant Cryptography
129(38)
NIST Post-Quantum Contest
129(7)
NIST Security Strength Classifications
132(1)
PKE vs. KEM
133(1)
Formal Indistinguishability Assurances
134(1)
Key and Ciphertext Sizes
135(1)
Types of Post-Quantum Algorithms
136(7)
Code-Based Cryptography
136(1)
Hash-Based Cryptography
137(1)
Lattice-Based Cryptography
138(2)
Multivariate Cryptography
140(1)
Supersingular Elliptic Curve Isogeny Cryptography
140(1)
Zero-Knowledge Proof
141(1)
Symmetric Key Quantum Resistance
142(1)
Quantum-Resistant Asymmetric Encryption Ciphers
143(13)
BIKE
145(1)
Classic McEliece
145(1)
CRYSTALS-Kyber
146(1)
FrodoKEM
146(1)
HQC
147(1)
LAC
148(1)
LEDAcrypt
148(1)
NewHope
149(1)
NTRU
149(1)
NTRU Prime
150(1)
NTS-KEM
150(1)
ROLLO
151(1)
Rounds
151(1)
RQC
151(1)
SABER
152(1)
SIKE
152(1)
ThreeBears
153(2)
General Observations on PKE and KEM Key and Ciphertext Sizes
155(1)
Quantum-Resistant Digital Signatures
156(8)
CRYSTALS-Dilithium
156(1)
FALCON
157(1)
GeMSS
158(1)
LUOV
158(1)
MQDSS
159(1)
Picnic
159(1)
qTESLA
160(1)
Rainbow
160(1)
SPHINCS+
161(1)
General Observations on Signature Key and Sizes
162(2)
Caution Advised
164(2)
A Lack of Standards
164(1)
Performance Concerns
165(1)
Lack of Verified Protection
165(1)
For Additional Information
166(1)
Summary
166(1)
7 Quantum Cryptography
167(22)
Quantum RNGs
168(9)
Random Is Not Always Random
168(2)
Why Is True Randomness So Important?
170(2)
Quantum-Based RNGs
172(5)
Quantum Hashes and Signatures
177(3)
Quantum Hashes
177(1)
Quantum Digital Signatures
178(2)
Quantum Encryption Ciphers
180(8)
Quantum Key Distribution
181(7)
Summary
188(1)
8 Quantum Networking
189(18)
Quantum Network Components
189(10)
Transmission Media
189(2)
Distance vs. Speed
191(1)
Point-to-Point
192(1)
Trusted Repeaters
193(1)
True Quantum Repeaters
194(2)
Quantum Network Protocols
196(3)
Quantum Network Applications
199(4)
More Secure Networks
199(1)
Quantum Computing Cloud
200(1)
Better Time Syncing
200(1)
Prevent Jamming
201(1)
Quantum Internet
202(1)
Other Quantum Networks
203(1)
For More Information
204(1)
Summary
204(3)
9 Preparing Now
207(24)
Four Major Post-Quantum Mitigation Phases
207(7)
Stage 1 Strengthen Current Solutions
207(4)
Stage 2 Move to Quantum-Resistant Solutions
211(2)
Stage 3 Implement Quantum-Hybrid Solutions
213(1)
Stage 4 Implement Fully Quantum Solutions
214(1)
The Six Major Post-Quantum Mitigation Project Steps
214(16)
Step 1 Educate
215(5)
Step 2 Create a Plan
220(5)
Step 3 Collect Data
225(1)
Step 4 Analyze
226(2)
Step 5 Take Action/Remediate
228(2)
Step 6 Review and Improve
230(1)
Summary
230(1)
Appendix: Additional Quantum Resources 231(8)
Index 239
Roger A. Grimes has worked in computer security for over 30 years, specializing in host and network protection, including cryptographic systems. As a professional penetration tester, he successfully broke into every company he was hired to hack into within an hour, with a single exception that took three hours. He has been the computer security columnist for InfoWorld and CSOOnline magazines since 2005. As evangelist for KnowBe4, the world's largest security awareness training vendor, Roger speaks at major security industry events worldwide.