Becoming Quantum Safe (eBook)
211 Seiten
Wiley (Verlag)
978-1-394-37434-2 (ISBN)
Lese- und Medienproben
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on the challenge posed by quantum computing to current cryptography. This comprehensive playbook delivers step-by-step strategies for transitioning to Post-Quantum Cryptography (PQC)-ensuring your organization remains secure, compliant, and resilient in the quantum era.
Authored by leading experts in cybersecurity, cryptography, and quantum technologies, this book demystifies the quantum threat, explains the vulnerabilities in today's encryption, and provides clear, actionable guidance to achieve crypto-agility and implement quantum-safe cryptography.
What You Will Learn:
- What is Quantum Computing and how it Threatens Current Encryption
Understand the basics of quantum computing and the challenges it poses to RSA, ECC, and other widely used encryption. Gain explanations of Shor's Algorithm, Grover's Algorithm, and how they impact classical cryptography. - Practical Crypto-Agility Strategies
Learn how to build a crypto-agile enterprise-one that can rapidly adopt, test, deploy, and manage new cryptographic standards without disrupting business operations. - A Roadmap to Post-Quantum Cryptography (PQC) Adoption
Follow a proven, step-by-step framework to transition from classical to quantum-safe cryptography. Identify key milestones, address operational challenges, and implement solutions that safeguard data, operations, and digital trust. Learn about the consortia work that brings together players in the ecosystem and how one can leverage the work being done to accelerate the quantum safe journey. - Case Studies Across Industries
See how global leaders in banking, financial services, government, telecommunications, healthcare, and retail are adopting post-quantum cryptography to mitigate risks, achieve compliance, and future-proof their security infrastructure.
Why This Book Matters Now:
- The quantum threat to encryption is real and time-sensitive. Quantum computers will render today's encryption obsolete, exposing sensitive data, customer trust, and business continuity.
- Regulatory pressures are rising. Governments and standards bodies across the globe are mandating quantum-safe transitions.
- Organizations that embrace crypto-agility today will lead the future, maintaining a secure competitive edge in a quantum-powered world.
JAI SINGH ARUN spearheads global business strategy, product management, engineering, and go-to-market execution for IBM Quantum Safe.
RAY HARISHANKAR is an IBM Fellow in the Quantum team. He leads business and technical strategy for IBM Quantum Safe.
WALID RJAIBI is a Distinguished Engineer and Chief Architect for Quantum Safe at IBM Research. He leads innovations to make the world quantum safe.
A practical guide to navigating cryptographic challenges in the era of quantum computing. Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on the challenge posed by quantum computing to current cryptography. This comprehensive playbook delivers step-by-step strategies for transitioning to Post-Quantum Cryptography (PQC) ensuring your organization remains secure, compliant, and resilient in the quantum era. Authored by leading experts in cybersecurity, cryptography, and quantum technologies, this book demystifies the quantum threat, explains the vulnerabilities in today's encryption, and provides clear, actionable guidance to achieve crypto-agility and implement quantum-safe cryptography. What You Will Learn: What is Quantum Computing and how it Threatens Current Encryption Understand the basics of quantum computing and the challenges it poses to RSA, ECC, and other widely used encryption. Gain explanations of Shor's Algorithm, Grover's Algorithm, and how they impact classical cryptography. Practical Crypto-Agility Strategies Learn how to build a crypto-agile enterprise one that can rapidly adopt, test, deploy, and manage new cryptographic standards without disrupting business operations. A Roadmap to Post-Quantum Cryptography (PQC) Adoption Follow a proven, step-by-step framework to transition from classical to quantum-safe cryptography. Identify key milestones, address operational challenges, and implement solutions that safeguard data, operations, and digital trust. Learn about the consortia work that brings together players in the ecosystem and how one can leverage the work being done to accelerate the quantum safe journey. Case Studies Across Industries See how global leaders in banking, financial services, government, telecommunications, healthcare, and retail are adopting post-quantum cryptography to mitigate risks, achieve compliance, and future-proof their security infrastructure. Why This Book Matters Now: The quantum threat to encryption is real and time-sensitive. Quantum computers will render today's encryption obsolete, exposing sensitive data, customer trust, and business continuity. Regulatory pressures are rising. Governments and standards bodies across the globe are mandating quantum-safe transitions. Organizations that embrace crypto-agility today will lead the future, maintaining a secure competitive edge in a quantum-powered world.
| Erscheint lt. Verlag | 17.9.2025 |
|---|---|
| Sprache | englisch |
| Themenwelt | Mathematik / Informatik ► Informatik ► Theorie / Studium |
| Schlagworte | asymmetric cryptography • Certificates • Compliance • Crypto-Agility • Cryptographic Risks • Cryptographic Vulnerabilities • Cryptographic Vulnerabilities Mitigation and Remediation • Cryptography Assets • Cryptography Objects • Cryptography Posture Management • cryptography standards • Data Security • Encryption • Governance • Keys • PKI Cybersecurity • post-quantum cryptography • PQC • PQC Case Studies • PQC Migration • PQC Standards • private key • Public Key • Public Key Infrastructure • Quantum Resilient Cryptography • Quantum Safe Cryptography • Regulations • Risk • Whitfield Diffie |
| ISBN-10 | 1-394-37434-8 / 1394374348 |
| ISBN-13 | 978-1-394-37434-2 / 9781394374342 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich