SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto

Cryptography Apocalypse, 1. udgave

Cryptography Apocalypse Vital Source e-bog

Roger A. Grimes
(2019)
John Wiley & Sons
295,00 kr.
Leveres umiddelbart efter køb
Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto

Cryptography Apocalypse

Preparing for the Day When Quantum Computing Breaks Today's Crypto
Roger A. Grimes
(2019)
Sprog: Engelsk
John Wiley & Sons, Limited
375,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage
  • Klik for at bedømme:
  • 0.0/6 (0 bedømmelser)

Detaljer om varen

  • 1. Udgave
  • Vital Source E-book
  • Udgiver: John Wiley & Sons (November 2019)
  • ISBN: 9781119618225

Will your organization be protected the day a quantum computer breaks encryption on the internet?

Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. 

Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:

  • Gives a simple quantum mechanics primer
  • Explains how quantum computing will break current cryptography
  • Offers practical advice for preparing for a post-quantum world
  • Presents the latest information on new cryptographic methods
  • Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats 

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Licens varighed:
Online udgaven er tilgængelig: 365 dage fra købsdato.
Offline udgaven er tilgængelig: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 10 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • Paperback: 272 sider
  • Udgiver: John Wiley & Sons, Limited (December 2019)
  • ISBN: 9781119618195

Will your organization be protected the day a quantum computer breaks encryption on the internet?

Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. 

Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:

  • Gives a simple quantum mechanics primer
  • Explains how quantum computing will break current cryptography
  • Offers practical advice for preparing for a post-quantum world
  • Presents the latest information on new cryptographic methods
  • Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats 

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Introduction
xxi I Quantum Computing Primer 1 1 Introduction to Quantum Mechanics 3 What is Quantum Mechanics? 3 Quantum is Counterintuitive 4 Quantum Mechanics is Real 5 The Basic Properties of Quantum Mechanics 8 Photons and Quantum Mechanics 8 Photoelectric Effect 9 Wave-Particle Duality 10 Probability Principle 14 Uncertainty Principle 17 Spin States and Charges 20 Quantum Tunneling 20 Superposition 21 Observer Effect 22 No-Cloning Theorem 24 Spooky Entanglement 24 Decoherence 25 Quantum Examples in Our World Today 27 For Additional Information 28 Summary 29 2 Introduction to Quantum Computers 31 How are Quantum Computers Different? 31 Traditional Computers Use Bits 31 Quantum Computers Use Qubits 33 Quantum Computers are Not Ready for Prime Time Yet 37 Quantum Will Reign Supreme Soon 38 Quantum Computers Improve Qubits Using Error Correction 39 Types of Quantum Computers 44 Superconducting Quantum Computers 44 Quantum Annealing Computers 45 Universal Quantum Computers 47 Topological Quantum Computers 49 Microsoft Majorana Fermion Computers 50 Ion Trap Quantum Computers 51 Quantum Computers in the Cloud 53 Non-U. S. Quantum Computers 53 Components of a Quantum Computer 54 Quantum Software 55 Quantum Stack 55 Quantum National Guidance 56 National Policy Guidance 56 Money Grants and Investments 56 Other Quantum Information Science Besides Computers 57 For More Information 58 Summary 58 3 How Can Quantum Computing Break Today''s Cryptography? 59 Cryptography Basics 59 Encryption 59 Integrity Hashing 72 Cryptographic Uses 73 How Quantum Computers Can Break Cryptography 74 Cutting Time 74 Quantum Algorithms 76 What Quantum Can and Can''t Break 79 Still Theoretical 82 Summary 83 4 When Will the Quantum Crypto Break Happen? 85 It Was Always "10 Years from Now" 85 Quantum Crypto Break Factors 86 Is Quantum Mechanics Real? 86 Are Quantum Computers Real? 87 Is Superposition Real? 87 Is Peter Shor''s Algorithm Real? 88 Do We Have Enough Stable Qubits? 88 Quantum Resources and Competition 89 Do We Have Steady Improvement? 89 Expert Opinions 90 When the Quantum Cyber Break Will Happen 90 Timing Scenarios 90 When Should You Prepare? 93 Breakout Scenarios 95 Stays in the Realm of Nation-States for a Long Time 95 Used by Biggest Companies 97 Mass Proliferation 97 Most Likely Breakout Scenario 97 Summary 98 5 What Will a Post-Quantum World Look Like? 99 Broken Applications 99 Weakened Hashes and Symmetric Ciphers 100 Broken Asymmetric Ciphers 103 Weakened and Broken Random Number Generators 103 Weakened or Broken Dependent Applications 104 Quantum Computing 114 Quantum Computers 114 Quantum Processors 115 Quantum Clouds 115 Quantum Cryptography Will Be Used 116 Quantum Perfect Privacy 116 Quantum Networking Arrives 117 Quantum Applications 117 Better Chemicals and Medicines 118 Better Batteries 118 True Artificial Intelligence 119 Supply Chain Management 120 Quantum Finance 120 Improved Risk Management 120 Quantum Marketing 120 Better Weather Prediction 121 Quantum Money 121 Quantum Simulation 122 More Precise Military and Weapons 122 Quantum Teleportation 122 Summary 126 II Preparing for the Quantum Break 127 6 Quantum-Resistant Cryptography 129 NIST Post-Quantum Contest 129 NIST Security Strength Classifications 132 PKE vs. KEM 133 Formal Indistinguishability Assurances 134 Key and Ciphertext Sizes 135 Types of Post-Quantum Algorithms 136 Code-Based Cryptography 136 Hash-Based Cryptography 137 Lattice-Based Cryptography 138 Multivariate Cryptography 140 Supersingular Elliptic Curve Isogeny Cryptography 140 Zero-Knowledge Proof 141 Symmetric Key Quantum Resistance 142 Quantum-Resistant Asymmetric Encryption Ciphers 143 BIKE 145 Classic McEliece 145 CRYSTALS-Kyber 146 FrodoKEM 146 HQC 147 LAC 148 LEDAcrypt 148 NewHope 149 NTRU 149 NTRU Prime 150 NTS-KEM 150 ROLLO 151 Round5 151 RQC 151 SABER 152 SIKE 152 ThreeBears 153 General Observations on PKE and KEM Key and Ciphertext Sizes 155 Quantum-Resistant Digital Signatures 156 CRYSTALS-Dilithium 156 FALCON 157 GeMSS 158 LUOV 158 MQDSS 159 Picnic 159 qTESLA 160 Rainbow 160 SPHINCS+ 161 General Observations on Signature Key and Sizes 162 Caution Advised 164 A Lack of Standards 164 Performance Concerns 165 Lack of Verified Protection 165 For Additional Information 166 Summary 166 7 Quantum Cryptography 167 Quantum RNGs 168 Random is Not Always Random 168 Why is True Randomness So Important? 170 Quantum-Based RNGs 172 Quantum Hashes and Signatures 177 Quantum Hashes 177 Quantum Digital Signatures 178 Quantum Encryption Ciphers 180 Quantum Key Distribution 181 Summary 188 8 Quantum Networking 189 Quantum Network Components 189 Transmission Media 189 Distance vs. Speed 191 Point-to-Point 192 Trusted Repeaters 193 True Quantum Repeaters 194 Quantum Network Protocols 196 Quantum Network Applications 199 More Secure Networks 199 Quantum Computing Cloud 200 Better Time Syncing 200 Prevent Jamming 201 Quantum Internet 202 Other Quantum Networks 203 For More Information 204 Summary 204 9 Preparing Now 207 Four Major Post-Quantum Mitigation Phases 207 Stage
1: Strengthen Current Solutions 207 Stage
2: Move to Quantum-Resistant Solutions 211 Stage
3: Implement Quantum-Hybrid Solutions 213 Stage
4: Implement Fully Quantum Solutions 214 The Six Major Post-Quantum Mitigation Project Steps 214
Step 1: Educate 215
Step 2: Create a Plan 220
Step 3: Collect Data 225
Step 4: Analyze 226
Step 5: Take Action/Remediate 228
Step 6: Review and Improve 230 Summary 230 Appendix: Additional Quantum Resources 231
Index 239
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Ebog: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 365 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.