Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
| AUTHOR | Grimes, Roger A. |
| PUBLISHER | Wiley (11/12/2019) |
| PRODUCT TYPE | Paperback (Paperback) |
And unfortunately the news gets worse. If malicious actors are sniffing your secrets now, they can sniff them today and store them for the future when they can break them. If your organization is relying solely on public key encryption to protect secrets that still need to be secret in 3 years, 5 years, and 10 years, you need to be immediately planning changes.
There is good news though in that "post quantum" cryptographic methods have been developed and are ready to be rolled out. But implementing and using them will require large investments in change. IT leaders and implementers will need to make decisions about what and how we protect with cryptography going forward not just "slap on post quantum" everywhere.
Cryptography Day of Reckoning explorers how quantum computing will break existing crypto, what better decisions we need to make about applying crypto, and how/where to implement new post-quantum crypto to keep users, data, and infrastructure safe.
Be protected the day quantum computing breaks encryption
Soon, if it hasn't happened already, someone with a quantum computer will break the encryption that secures passwords, user accounts, data, financial transactions, and every other aspect of digital life. Many of the current cryptographic methods, including HTTPS, TLS, WiFi protection, VPNs, and cryptocurrencies, will be rendered obsolete in an instant. In 2016, the National Institutes of Standards and Technology (NIST) said that all organizations should start preparing NOW for the coming quantum cryptographic break. Security professionals must heed that advice to prepare their organizations for the quantum computing security threat today.
Cryptography Apocalypse is an indispensable resource for every IT and InfoSec professional responsible for making appropriate decisions to meet the challenges of the coming quantum-computing revolution. Post-quantum crypto algorithms currently exist, but implementation will take time and more computing power. This invaluable guide provides real-world advice on where to best use current crypto technologies, explores how and when quantum computing will break existing crypto, and examines which applications are most likely to be broken in the near future. Written for anyone in the InfoSec world who needs to know if their security is ready for the day crypto breaks--and how to fix it--this must-have guide will help you:
- Implement new post-quantum crypto to keep users, data, and infrastructure safe
- Discover how quantum computing will break current cryptography
- Know when the quantum crypto break will likely occur
- Become familiar with basic concepts of quantum mechanics
- Protect against security threats with existing solutions
- Stay up to date with the latest cryptographic methods
- Apply practical advice for preparing for a post-quantum world
- Understand digital encryption, authentication, and integrity hashing basics
- Explore new inventions and improvements beyond crypto quantum computing will produce
- Learn about many of the incredible things that quantum computing will bring us in the near future
And unfortunately the news gets worse. If malicious actors are sniffing your secrets now, they can sniff them today and store them for the future when they can break them. If your organization is relying solely on public key encryption to protect secrets that still need to be secret in 3 years, 5 years, and 10 years, you need to be immediately planning changes.
There is good news though in that "post quantum" cryptographic methods have been developed and are ready to be rolled out. But implementing and using them will require large investments in change. IT leaders and implementers will need to make decisions about what and how we protect with cryptography going forward not just "slap on post quantum" everywhere.
Cryptography Day of Reckoning explorers how quantum computing will break existing crypto, what better decisions we need to make about applying crypto, and how/where to implement new post-quantum crypto to keep users, data, and infrastructure safe.
