Encryption for Organizations and Individuals : Basics of Contemporary and Quantum Cryptography
Encryption for Organizations and Individuals : Basics of Contemporary and Quantum Cryptography
Click to enlarge
Author(s): Ciesla, Robert
ISBN No.: 9781484260555
Pages: xxi, 286
Year: 202008
Format: Trade Paper
Price: $ 96.59
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Chapter 1: From World War II to Your iPad: The First Digital Era of Encryption (9 pages) Chapter contents: The history of cryptography with some rudimentary basics of digital encryption Chapter 2: A Medium-Length History of Digital Cryptography (10 pages) Chapter contents: A look at how the current-generation encryption methods came about, with emphasis on the 1960s and 1970s breakthroughs in the field, including the basics of the Rivest-Shamir-Adleman (RSA) -algorithm Chapter 3: Some Established Uses and Technologies (20 pages) Chapter contents: hashes, prime numbers, the Rivest-Shamir-Adleman -algorithm in detail, basics of the Advanced Encryption Standard (AES) Chapter 4: You, Your Organization, and Cryptographic Security (15 pages) Chapter contents: the built-in encryption in operating systems, a review of current day 3rd party software suites for encryption and how to best use them Chapter 5: Common Attacks Against Encrypted Systems (30 pages) Chapter contents: an in-depth look at some of the most common cryptographic attacks, including dictionary attacks, man-in-the-middle attacks, and rainbow tables to name but three (out of dozens). Best practices in how to counter them. Chapter 6: Mankinis and Government Secrets: Creating Extremely Secure Contemporary Systems (15 pages) Chapter contents: guidance for using advanced techniques to counter rogue actor surveillance, including multiple layers of strong encryption and good encryption key policies. Chapter 7: Prohibitions and Legal Issues (15 pages) Chapter contents: the basics of cryptography law in various jurisdictions around the world: which algorithms and software is and isn''t allowed. Issues of law relating to the import and export of encrypted data between different nations. Chapter 8: Quantum Computing: The Next Big Computing Paradigm (5 pages) Chapter contents: how quantum computing differs from the current computing paradigm and what it potentially means for the reader in the near future. Chapter 9: The Rollicking World of Quantum Mechanics (15 pages) Chapter contents: The basics concepts of quantum mechanics, including wave functions, entanglement, and non-locality. A short summary of the work by Einstein, Heisenberg, Schrödinger and other famous physicists in the field.


Chapter 10: Quantum Information Science 101 (15 pages) Chapter contents: How quantum computers work in practice. How qubits, quantum errors, and superposition operate in this context. The basics of the main four quantum computing models: quantum gate arrays, one-way quantum computers, adiabatic quantum systems, and topological quantum computers. Chapter 11: Quantum Cryptography (5 pages) Chapter contents: A lexicon of the basic terms of this field, including Shor''s algorithm, quantum key distribution (QKD), commitment schemes, and quantum coin flipping. Chapter 12: Quantum Key Distribution (QKD) (10 pages) Chapter contents: A more in-depth look at the best researched quantum cryptographic method, QKD, and how it differs from current encryption methodologies. Chapter 13: Current Implementations of QKD (10 pages) Chapter contents: A look at the various current implementations of QKD including distribution systems by SeQureNet, and QKD-distribution networks provided DARPA Quantum Network, SwissQuantum, and Tokyo QKD Network. Chapter 14: The Very Near Future of Quantum Cryptography (14 pages) Chapter contents: A look at some potential post-QKD technologies, including quantum digital signatures and public-key integration. Chapter 15: Fighting Rogue Quantum Systems in 2040: Post-Quantum Cryptography (11 pages) Chapter contents: The means of defending against cryptographic attacks in the up-and-coming quantum age, such as zero-knowledge proof systems.



To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...