Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cryptography apocalypse: preparing for the day when quantum computing breaks today's crypto
Bookmark Share

Text

Cryptography apocalypse: preparing for the day when quantum computing breaks today's crypto

Grimes, Roger A. - Personal Name;

Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare.
Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:

Table of Contents
I: Quantum Computing Primer
1 Introduction to Quantum Mechanics
2 Introduction to Quantum Computers
3 How Can Quantum Computing Break Today's Cryptography?
4 When Will the Quantum Crypto Break Happen?
5 What Will a Post-Quantum World Look Like?

II: Preparing for the Quantum Break
6 Quantum-Resistant Cryptography
7 Quantum Cryptography
8 Quantum Networking
9 Preparing Now
Appendix: Additional Quantum Resources
Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.82 GRI c
b0002283
Available
Detail Information
Series Title
--
Call Number
005.82 GRI c
Publisher
Hoboken : Wiley., 2020
Collation
xxiv, 248 hlm.; ilus.; 23 cm
Language
English
ISBN/ISSN
9781119618195
Classification
005.82
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Cryptography
Data Encryption (Computer Security)
Specific Detail Info
--
Statement of Responsibility
Roger A. Grimes
Other Information
Link
-
Daftar Isi
-
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?