Details

Cryptography Apocalypse


Cryptography Apocalypse

Preparing for the Day When Quantum Computing Breaks Today's Crypto
1. Aufl.

von: Roger A. Grimes

22,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 15.10.2019
ISBN/EAN: 9781119618218
Sprache: englisch
Anzahl Seiten: 272

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Will your organization be protected the day a quantum computer breaks encryption on the internet? </b></p> <p>Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take <i>billions</i> of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day—HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication—will be virtually useless. . . unless you prepare. </p> <p><i>Cryptography Apocalypse</i> is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:</p> <ul> <li>Gives a simple quantum mechanics primer</li> <li>Explains how quantum computing will break current cryptography</li> <li>Offers practical advice for preparing for a post-quantum world</li> <li>Presents the latest information on new cryptographic methods</li> <li>Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats </li> </ul> <p><i>Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto </i>is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.</p>
<p>Introduction xxi</p> <p><b>I Quantum Computing Primer 1</b></p> <p><b>1 </b><b>Introduction to Quantum Mechanics 3</b></p> <p>What is Quantum Mechanics? 3</p> <p>Quantum is Counterintuitive 4</p> <p>Quantum Mechanics is Real 5</p> <p>The Basic Properties of Quantum Mechanics 8</p> <p>Photons and Quantum Mechanics 8</p> <p>Photoelectric Effect 9</p> <p>Wave-Particle Duality 10</p> <p>Probability Principle 14</p> <p>Uncertainty Principle 17</p> <p>Spin States and Charges 20</p> <p>Quantum Tunneling 20</p> <p>Superposition 21</p> <p>Observer Effect 22</p> <p>No-Cloning Theorem 24</p> <p>Spooky Entanglement 24</p> <p>Decoherence 25</p> <p>Quantum Examples in Our World Today 27</p> <p>For Additional Information 28</p> <p>Summary 29</p> <p><b>2 </b><b>Introduction to Quantum Computers 31</b></p> <p>How are Quantum Computers Different? 31</p> <p>Traditional Computers Use Bits 31</p> <p>Quantum Computers Use Qubits 33</p> <p>Quantum Computers are Not Ready for Prime Time Yet 37</p> <p>Quantum Will Reign Supreme Soon 38</p> <p>Quantum Computers Improve Qubits Using Error Correction 39</p> <p>Types of Quantum Computers 44</p> <p>Superconducting Quantum Computers 44</p> <p>Quantum Annealing Computers 45</p> <p>Universal Quantum Computers 47</p> <p>Topological Quantum Computers 49</p> <p>Microsoft Majorana Fermion Computers 50</p> <p>Ion Trap Quantum Computers 51</p> <p>Quantum Computers in the Cloud 53</p> <p>Non-U.S. Quantum Computers 53</p> <p>Components of a Quantum Computer 54</p> <p>Quantum Software 55</p> <p>Quantum Stack 55</p> <p>Quantum National Guidance 56</p> <p>National Policy Guidance 56</p> <p>Money Grants and Investments 56</p> <p>Other Quantum Information Science Besides Computers 57</p> <p>For More Information 58</p> <p>Summary 58</p> <p><b>3 </b><b>How Can Quantum Computing Break Today’s Cryptography? 59</b></p> <p>Cryptography Basics 59</p> <p>Encryption 59</p> <p>Integrity Hashing 72</p> <p>Cryptographic Uses 73</p> <p>How Quantum Computers Can Break Cryptography 74</p> <p>Cutting Time 74</p> <p>Quantum Algorithms 76</p> <p>What Quantum Can and Can’t Break 79</p> <p>Still Theoretical 82</p> <p>Summary 83</p> <p><b>4 </b><b>When Will the Quantum Crypto Break Happen? 85</b></p> <p>It Was Always “10 Years from Now” 85</p> <p>Quantum Crypto Break Factors 86</p> <p>Is Quantum Mechanics Real? 86</p> <p>Are Quantum Computers Real? 87</p> <p>Is Superposition Real? 87</p> <p>Is Peter Shor’s Algorithm Real? 88</p> <p>Do We Have Enough Stable Qubits? 88</p> <p>Quantum Resources and Competition 89</p> <p>Do We Have Steady Improvement? 89</p> <p>Expert Opinions 90</p> <p>When the Quantum Cyber Break Will Happen 90</p> <p>Timing Scenarios 90</p> <p>When Should You Prepare? 93</p> <p>Breakout Scenarios 95</p> <p>Stays in the Realm of Nation-States for a Long Time 95</p> <p>Used by Biggest Companies 97</p> <p>Mass Proliferation 97</p> <p>Most Likely Breakout Scenario 97</p> <p>Summary 98</p> <p><b>5 </b><b>What Will a Post-Quantum World Look Like? 99</b></p> <p>Broken Applications 99</p> <p>Weakened Hashes and Symmetric Ciphers 100</p> <p>Broken Asymmetric Ciphers 103</p> <p>Weakened and Broken Random Number Generators 103</p> <p>Weakened or Broken Dependent Applications 104</p> <p>Quantum Computing 114</p> <p>Quantum Computers 114</p> <p>Quantum Processors 115</p> <p>Quantum Clouds 115</p> <p>Quantum Cryptography Will Be Used 116</p> <p>Quantum Perfect Privacy 116</p> <p>Quantum Networking Arrives 117</p> <p>Quantum Applications 117</p> <p>Better Chemicals and Medicines 118</p> <p>Better Batteries 118</p> <p>True Artificial Intelligence 119</p> <p>Supply Chain Management 120</p> <p>Quantum Finance 120</p> <p>Improved Risk Management 120</p> <p>Quantum Marketing 120</p> <p>Better Weather Prediction 121</p> <p>Quantum Money 121</p> <p>Quantum Simulation 122</p> <p>More Precise Military and Weapons 122</p> <p>Quantum Teleportation 122</p> <p>Summary 126</p> <p><b>II Preparing for the Quantum Break 127</b></p> <p><b>6 </b><b>Quantum-Resistant Cryptography 129</b></p> <p>NIST Post-Quantum Contest 129</p> <p>NIST Security Strength Classifications 132</p> <p>PKE vs. KEM 133</p> <p>Formal Indistinguishability Assurances 134</p> <p>Key and Ciphertext Sizes 135</p> <p>Types of Post-Quantum Algorithms 136</p> <p>Code-Based Cryptography 136</p> <p>Hash-Based Cryptography 137</p> <p>Lattice-Based Cryptography 138</p> <p>Multivariate Cryptography 140</p> <p>Supersingular Elliptic Curve Isogeny Cryptography 140</p> <p>Zero-Knowledge Proof 141</p> <p>Symmetric Key Quantum Resistance 142</p> <p>Quantum-Resistant Asymmetric Encryption Ciphers 143</p> <p>BIKE 145</p> <p>Classic McEliece 145</p> <p>CRYSTALS-Kyber 146</p> <p>FrodoKEM 146</p> <p>HQC 147</p> <p>LAC 148</p> <p>LEDAcrypt 148</p> <p>NewHope 149</p> <p>NTRU 149</p> <p>NTRU Prime 150</p> <p>NTS-KEM 150</p> <p>ROLLO 151</p> <p>Round5 151</p> <p>RQC 151</p> <p>SABER 152</p> <p>SIKE 152</p> <p>ThreeBears 153</p> <p>General Observations on PKE and KEM Key and Ciphertext Sizes 155</p> <p>Quantum-Resistant Digital Signatures 156</p> <p>CRYSTALS-Dilithium 156</p> <p>FALCON 157</p> <p>GeMSS 158</p> <p>LUOV 158</p> <p>MQDSS 159</p> <p>Picnic 159</p> <p>qTESLA 160</p> <p>Rainbow 160</p> <p>SPHINCS+ 161</p> <p>General Observations on Signature Key and Sizes 162</p> <p>Caution Advised 164</p> <p>A Lack of Standards 164</p> <p>Performance Concerns 165</p> <p>Lack of Verified Protection 165</p> <p>For Additional Information 166</p> <p>Summary 166</p> <p><b>7 </b><b>Quantum Cryptography 167</b></p> <p>Quantum RNGs 168</p> <p>Random is Not Always Random 168</p> <p>Why is True Randomness So Important? 170</p> <p>Quantum-Based RNGs 172</p> <p>Quantum Hashes and Signatures 177</p> <p>Quantum Hashes 177</p> <p>Quantum Digital Signatures 178</p> <p>Quantum Encryption Ciphers 180</p> <p>Quantum Key Distribution 181</p> <p>Summary 188</p> <p><b>8 </b><b>Quantum Networking 189</b></p> <p>Quantum Network Components 189</p> <p>Transmission Media 189</p> <p>Distance vs. Speed 191</p> <p>Point-to-Point 192</p> <p>Trusted Repeaters 193</p> <p>True Quantum Repeaters 194</p> <p>Quantum Network Protocols 196</p> <p>Quantum Network Applications 199</p> <p>More Secure Networks 199</p> <p>Quantum Computing Cloud 200</p> <p>Better Time Syncing 200</p> <p>Prevent Jamming 201</p> <p>Quantum Internet 202</p> <p>Other Quantum Networks 203</p> <p>For More Information 204</p> <p>Summary 204</p> <p><b>9 </b><b>Preparing Now 207</b></p> <p>Four Major Post-Quantum Mitigation Phases 207</p> <p>Stage 1: Strengthen Current Solutions 207</p> <p>Stage 2: Move to Quantum-Resistant Solutions 211</p> <p>Stage 3: Implement Quantum-Hybrid Solutions 213</p> <p>Stage 4: Implement Fully Quantum Solutions 214</p> <p>The Six Major Post-Quantum Mitigation Project Steps 214</p> <p>Step 1: Educate 215</p> <p>Step 2: Create a Plan 220</p> <p>Step 3: Collect Data 225</p> <p>Step 4: Analyze 226</p> <p>Step 5: Take Action/Remediate 228</p> <p>Step 6: Review and Improve 230</p> <p>Summary 230</p> <p>Appendix: Additional Quantum Resources 231</p> <p>Index 239</p>
<p><b>Roger A. Grimes</b> has worked in computer security for over 30 years, specializing in host and network protection, including cryptographic systems. As a professional penetration tester, he successfully broke into every company he was hired to hack into within an hour, with a single exception that took three hours. He has been the computer security columnist for <i>InfoWorld</i> and <i>CSOOnline</i> magazines since 2005. As evangelist for KnowBe4, the world's largest security awareness training vendor, Roger speaks at major security industry events worldwide.
<p><b>Be protected the day quantum computing breaks encryption</b> <p>Soon, if it hasn't happened already, someone with a quantum computer will break the encryption that secures passwords, user accounts, data, financial transactions, and every other aspect of digital life. Many of the current cryptographic methods, including HTTPS, TLS, WiFi protection, VPNs, and cryptocurrencies, will be rendered obsolete in an instant. In 2016, the National Institutes of Standards and Technology (NIST) said that all organizations should start preparing NOW for the coming quantum cryptographic break. Security professionals must heed that advice to prepare their organizations for the quantum computing security threat <i>today</i>. <p><i>Cryptography Apocalypse</i> is an indispensable resource for every IT and InfoSec professional responsible for making appropriate decisions to meet the challenges of the coming quantum-computing revolution. Post-quantum crypto algorithms currently exist, but implementation will take time and more computing power. This invaluable guide provides real-world advice on where to best use current crypto technologies, explores how and when quantum computing will break existing crypto, and examines which applications are most likely to be broken in the near future. Written for anyone in the InfoSec world who needs to know if their security is ready for the day crypto breaks—and how to fix it—this must-have guide will help you: <ul> <li>Implement new post-quantum crypto to keep users, data, and infrastructure safe</li> <li>Discover how quantum computing will break current cryptography</li> <li>Know when the quantum crypto break will likely occur</li> <li>Become familiar with basic concepts of quantum mechanics</li> <li>Protect against security threats with existing solutions</li> <li>Stay up to date with the latest cryptographic methods</li> <li>Apply practical advice for preparing for a post-quantum world</li> <li>Understand digital encryption, authentication, and integrity hashing basics</li> <li>Explore new inventions and improvements beyond crypto quantum computing will produce</li> <li>Learn about many of the incredible things that quantum computing will bring us in the near future</li> </ul>

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
PDF ebook
53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
PDF ebook
107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
PDF ebook
150,99 €