- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on the challenge posed by quantum computing to current cryptography. This comprehensive playbook delivers step-by-step strategies for transitioning to Post-Quantum Cryptography (PQC)—ensuring your organization remains secure, compliant, and resilient in the quantum era.
Authored by leading experts in cybersecurity, cryptography, and quantum technologies, this book demystifies the quantum threat, explains the vulnerabilities in today's encryption, and provides clear, actionable guidance to achieve crypto-agility and implement quantum-safe cryptography.
What You Will Learn:
What is Quantum Computing and how it Threatens Current Encryption
Understand the basics of quantum computing and the challenges it poses to RSA, ECC, and other widely used encryption. Gain explanations of Shor's Algorithm, Grover's Algorithm, and how they impact classical cryptography.
Practical Crypto-Agility Strategies
Learn how to build a crypto-agile enterprise—one that can rapidly adopt, test, deploy, and manage new cryptographic standards without disrupting business operations.
A Roadmap to Post-Quantum Cryptography (PQC) Adoption
Follow a proven, step-by-step framework to transition from classical to quantum-safe cryptography. Identify key milestones, address operational challenges, and implement solutions that safeguard data, operations, and digital trust. Learn about the consortia work that brings together players in the ecosystem and how one can leverage the work being done to accelerate the quantum safe journey.
Case Studies Across Industries
See how global leaders in banking, financial services, government, telecommunications, healthcare, and retail are adopting post-quantum cryptography to mitigate risks, achieve compliance, and future-proof their security infrastructure.
Why This Book Matters Now:
The quantum threat to encryption is real and time-sensitive. Quantum computers will render today's encryption obsolete, exposing sensitive data, customer trust, and business continuity.
Regulatory pressures are rising. Governments and standards bodies across the globe are mandating quantum-safe transitions.
Organizations that embrace crypto-agility today will lead the future, maintaining a secure competitive edge in a quantum-powered world.
Contents
Foreword by Whitfield Diffie xiii
Chapter 1 Introduction to Quantum Computing and Its Impact 1
Evolution of Computing 1
Quantum Computing 3
Applications of Quantum Computing 5
Challenges in Developing Quantum Computers 10
Quantum Algorithms 11
Quantum Computing and Modern Cryptography 12
Impact of Potential Threats to Modern Cryptography 13
Need for Action Now 16
Responsible Quantum Computing 18
Summary 18
References 19
Chapter 2 Cryptography: An Ultimate Line of Defense for the Digital World 21
Introduction to Cryptography and Its Importance 21
Cryptography Primer for Business 24
Understanding the Pervasiveness of Encryption Across Business Security, Privacy, and Compliance 29
Cryptography in Practice Across Industries: Use-Case Scenarios and Business Value 34
Cryptography Technology and Solutions Architecture for Businesses 38
Summary 43
References 43
Chapter 3 Understanding Classical and Post-Quantum Cryptography and Solutions 45
Classical Cryptographic Algorithms and Their Applications 46
Post-Quantum Cryptography 51
Additional Quantum-Safe Technologies 56
Contrasting Quantum-Safe Technologies 58
Summary 59
References 59
Chapter 4 Managing Risks in the Quantum Era 61
Identifying Quantum-Related Business Risks and Impacts 61
Building a Robust Risk Management Framework Against Quantum Threats 65
Quantum Risk Assessment: A Comprehensive Approach with Heat Maps and Maturity Models 70
Continuous Monitoring and Adaptation to Evolving Quantum Risks 75
Regulatory Compliance in the Quantum-Safe Landscape 79
Summary 83
References 83
Chapter 5 Implementing Quantum-Safe Solutions to Protect Your Business 85
The Urgency of Transitioning to Quantum-Safe Cryptography 86
A Prescriptive Approach for Transitioning to Quantum-Safe Cryptography 89
Case Study: Transitioning IBM DB2 to Quantum-Safe Cryptography 95
Summary 99
References 99
Chapter 6 Ensuring a Successful Transition to Quantum Safe 101
Building a Quantum-Safe Transition Roadmap 101
Pitfalls and Mitigation Strategies 113
Summary 118
References 118
Chapter 7 Leveraging the Ecosystem 119
Collaboration with the Ecosystem 120
Global PQC Guidance 128
Summary 132
References 132
Chapter 9 Achieving Crypto-Agility: Future-Proofing Your Business 135
Defining Crypto-Agility and the Essential Framework 136
Cultivating a Culture of Crypto-Agility Across the Organization 141
Balancing Security and Flexibility in a Crypto-Agile Environment 148
Sustaining Crypto-Agility: Continuous Improvement and Innovation 152
Summary 156
References 156
A Vision of Securing the Digital World in the Quantum Era 159
Looking Ahead to a Quantum-Safe World 160
Quantum Safe at the Intersection of Emerging Technologies 161
Quantum Computing Roadmap 173
Key Takeaways for Business and Technology Leaders 175
Your Journey to Becoming Quantum Safe 175
References 176
Acknowledgments 179
About the Authors 183
Index 185