Becoming Quantum Safe : Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility

個数:
電子版価格
¥6,359
  • 電子版あり

Becoming Quantum Safe : Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 208 p.
  • 言語 ENG
  • 商品コード 9781394374328
  • DDC分類 005.824

Full Description

A practical guide to navigating cryptographic challenges in the era of quantum computing.

Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on the challenge posed by quantum computing to current cryptography. This comprehensive playbook delivers step-by-step strategies for transitioning to Post-Quantum Cryptography (PQC)—ensuring your organization remains secure, compliant, and resilient in the quantum era.

Authored by leading experts in cybersecurity, cryptography, and quantum technologies, this book demystifies the quantum threat, explains the vulnerabilities in today's encryption, and provides clear, actionable guidance to achieve crypto-agility and implement quantum-safe cryptography.

What You Will Learn:

What is Quantum Computing and how it Threatens Current Encryption
Understand the basics of quantum computing and the challenges it poses to RSA, ECC, and other widely used encryption. Gain explanations of Shor's Algorithm, Grover's Algorithm, and how they impact classical cryptography.
Practical Crypto-Agility Strategies
Learn how to build a crypto-agile enterprise—one that can rapidly adopt, test, deploy, and manage new cryptographic standards without disrupting business operations.
A Roadmap to Post-Quantum Cryptography (PQC) Adoption
Follow a proven, step-by-step framework to transition from classical to quantum-safe cryptography. Identify key milestones, address operational challenges, and implement solutions that safeguard data, operations, and digital trust. Learn about the consortia work that brings together players in the ecosystem and how one can leverage the work being done to accelerate the quantum safe journey.
Case Studies Across Industries
See how global leaders in banking, financial services, government, telecommunications, healthcare, and retail are adopting post-quantum cryptography to mitigate risks, achieve compliance, and future-proof their security infrastructure.

Why This Book Matters Now:

The quantum threat to encryption is real and time-sensitive. Quantum computers will render today's encryption obsolete, exposing sensitive data, customer trust, and business continuity.
Regulatory pressures are rising. Governments and standards bodies across the globe are mandating quantum-safe transitions.
Organizations that embrace crypto-agility today will lead the future, maintaining a secure competitive edge in a quantum-powered world.

Contents

Foreword by Whitfield Diffie xiii

Chapter 1 Introduction to Quantum Computing and Its Impact 1

Evolution of Computing 1

Quantum Computing 3

Applications of Quantum Computing 5

Challenges in Developing Quantum Computers 10

Quantum Algorithms 11

Quantum Computing and Modern Cryptography 12

Impact of Potential Threats to Modern Cryptography 13

Need for Action Now 16

Responsible Quantum Computing 18

Summary 18

References 19

Chapter 2 Cryptography: An Ultimate Line of Defense for the Digital World 21

Introduction to Cryptography and Its Importance 21

Cryptography Primer for Business 24

Understanding the Pervasiveness of Encryption Across Business Security, Privacy, and Compliance 29

Cryptography in Practice Across Industries: Use-Case Scenarios and Business Value 34

Cryptography Technology and Solutions Architecture for Businesses 38

Summary 43

References 43

Chapter 3 Understanding Classical and Post-Quantum Cryptography and Solutions 45

Classical Cryptographic Algorithms and Their Applications 46

Post-Quantum Cryptography 51

Additional Quantum-Safe Technologies 56

Contrasting Quantum-Safe Technologies 58

Summary 59

References 59

Chapter 4 Managing Risks in the Quantum Era 61

Identifying Quantum-Related Business Risks and Impacts 61

Building a Robust Risk Management Framework Against Quantum Threats 65

Quantum Risk Assessment: A Comprehensive Approach with Heat Maps and Maturity Models 70

Continuous Monitoring and Adaptation to Evolving Quantum Risks 75

Regulatory Compliance in the Quantum-Safe Landscape 79

Summary 83

References 83

Chapter 5 Implementing Quantum-Safe Solutions to Protect Your Business 85

The Urgency of Transitioning to Quantum-Safe Cryptography 86

A Prescriptive Approach for Transitioning to Quantum-Safe Cryptography 89

Case Study: Transitioning IBM DB2 to Quantum-Safe Cryptography 95

Summary 99

References 99

Chapter 6 Ensuring a Successful Transition to Quantum Safe 101

Building a Quantum-Safe Transition Roadmap 101

Pitfalls and Mitigation Strategies 113

Summary 118

References 118

Chapter 7 Leveraging the Ecosystem 119

Collaboration with the Ecosystem 120

Global PQC Guidance 128

Summary 132

References 132

Chapter 9 Achieving Crypto-Agility: Future-Proofing Your Business 135

Defining Crypto-Agility and the Essential Framework 136

Cultivating a Culture of Crypto-Agility Across the Organization 141

Balancing Security and Flexibility in a Crypto-Agile Environment 148

Sustaining Crypto-Agility: Continuous Improvement and Innovation 152

Summary 156

References 156

A Vision of Securing the Digital World in the Quantum Era 159

Looking Ahead to a Quantum-Safe World 160

Quantum Safe at the Intersection of Emerging Technologies 161

Quantum Computing Roadmap 173

Key Takeaways for Business and Technology Leaders 175

Your Journey to Becoming Quantum Safe 175

References 176

Acknowledgments 179

About the Authors 183

Index 185

最近チェックした商品