Text
Cryptography apocalypse: preparing for the day when quantum computing breaks today's crypto
Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare.
Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:
Table of Contents
I: Quantum Computing Primer
1 Introduction to Quantum Mechanics
2 Introduction to Quantum Computers
3 How Can Quantum Computing Break Today's Cryptography?
4 When Will the Quantum Crypto Break Happen?
5 What Will a Post-Quantum World Look Like?
II: Preparing for the Quantum Break
6 Quantum-Resistant Cryptography
7 Quantum Cryptography
8 Quantum Networking
9 Preparing Now
Appendix: Additional Quantum Resources
Index
No other version available