Chapter 1: From World War II to Your iPad: The First Digital Era of Encryption (9 pages) Chapter contents: The history of cryptography with some rudimentary basics of digital encryption Chapter 2: A Medium-Length History of Digital Cryptography (10 pages) Chapter contents: A look at how the current-generation encryption methods came about, with emphasis on the 1960s and 1970s breakthroughs in the field, including the basics of the Rivest-Shamir-Adleman (RSA) -algorithm Chapter 3: Some Established Uses and Technologies (20 pages) Chapter contents: hashes, prime numbers, the Rivest-Shamir-Adleman -algorithm in detail, basics of the Advanced Encryption Standard (AES) Chapter 4: You, Your Organization, and Cryptographic Security (15 pages) Chapter contents: the built-in encryption in operating systems, a review of current day 3rd party software suites for encryption and how to best use them Chapter 5: Common Attacks Against Encrypted Systems (30 pages) Chapter contents: an in-depth look at some of the most common cryptographic attacks, including dictionary attacks, man-in-the-middle attacks, and rainbow tables to name but three (out of dozens). Best practices in how to counter them. Chapter 6: Mankinis and Government Secrets: Creating Extremely Secure Contemporary Systems (15 pages) Chapter contents: guidance for using advanced techniques to counter rogue actor surveillance, including multiple layers of strong encryption and good encryption key policies. Chapter 7: Prohibitions and Legal Issues (15 pages) Chapter contents: the basics of cryptography law in various jurisdictions around the world: which algorithms and software is and isn''t allowed. Issues of law relating to the import and export of encrypted data between different nations. Chapter 8: Quantum Computing: The Next Big Computing Paradigm (5 pages) Chapter contents: how quantum computing differs from the current computing paradigm and what it potentially means for the reader in the near future. Chapter 9: The Rollicking World of Quantum Mechanics (15 pages) Chapter contents: The basics concepts of quantum mechanics, including wave functions, entanglement, and non-locality. A short summary of the work by Einstein, Heisenberg, Schrödinger and other famous physicists in the field.
Chapter 10: Quantum Information Science 101 (15 pages) Chapter contents: How quantum computers work in practice. How qubits, quantum errors, and superposition operate in this context. The basics of the main four quantum computing models: quantum gate arrays, one-way quantum computers, adiabatic quantum systems, and topological quantum computers. Chapter 11: Quantum Cryptography (5 pages) Chapter contents: A lexicon of the basic terms of this field, including Shor''s algorithm, quantum key distribution (QKD), commitment schemes, and quantum coin flipping. Chapter 12: Quantum Key Distribution (QKD) (10 pages) Chapter contents: A more in-depth look at the best researched quantum cryptographic method, QKD, and how it differs from current encryption methodologies. Chapter 13: Current Implementations of QKD (10 pages) Chapter contents: A look at the various current implementations of QKD including distribution systems by SeQureNet, and QKD-distribution networks provided DARPA Quantum Network, SwissQuantum, and Tokyo QKD Network. Chapter 14: The Very Near Future of Quantum Cryptography (14 pages) Chapter contents: A look at some potential post-QKD technologies, including quantum digital signatures and public-key integration. Chapter 15: Fighting Rogue Quantum Systems in 2040: Post-Quantum Cryptography (11 pages) Chapter contents: The means of defending against cryptographic attacks in the up-and-coming quantum age, such as zero-knowledge proof systems.