|
|
|||
|
||||
OverviewEvery encrypted transaction your organization relies on today - every financial transfer, patient record, classified message, and identity verification - rests on mathematical assumptions that a sufficiently powerful quantum computer will break. As your manuscript warns, ""Every encrypted message your organization sent today rests on a mathematical problem that a sufficiently powerful quantum computer will solve."" The threat is no longer theoretical. The algorithms are published. The standards are finalized. Adversaries are already harvesting encrypted traffic to decrypt later. Managing Post-Quantum Cryptography is the essential guide for leaders who must secure their enterprise before the machines catch up. Written for CISOs, IT executives, architects, and modernization leaders, this book explains the quantum threat in clear, accessible terms - without requiring a background in physics or number theory - and provides a complete roadmap for transitioning to quantum-safe cryptography at enterprise scale. Readers will learn why classical encryption has an expiration date, how quantum algorithms break RSA and ECC, and why symmetric encryption survives but must be re-evaluated. The book demystifies the new post-quantum algorithm families, decodes the NIST selections, and explains what they mean for certificates, key exchange, authentication, and long-horizon data protection. This guide equips leaders to: Identify which systems, protocols, and data categories are most at risk Conduct a full cryptographic census across keys, certificates, algorithms, and dependencies Implement hybrid cryptography to bridge classical and post-quantum systems Build crypto-agility into enterprise architecture to avoid future forced migrations Prioritize migration using risk-tiered sequencing and dependency mapping Govern the transition across budget cycles, leadership changes, and vendor ecosystems Protect long-horizon data from ""harvest now, decrypt later"" adversaries Build a workforce and governance model capable of sustaining quantum resilience The book includes detailed playbooks, maturity models, migration templates, and decision frameworks that help leaders move from awareness to execution. It shows how to design hybrid deployments, evaluate vendor readiness, integrate new standards, and build monitoring systems that keep the enterprise secure long after the initial migration. Quantum computing will not wait for your organization to be ready. As the book emphasizes, ""The window for acting ahead of this threat is open now, but it is not indefinite."" This guide gives you the clarity, structure, and operational strategy to secure your enterprise before the machines catch up - and before your encrypted data becomes readable to anyone who has already captured it. If you are responsible for protecting sensitive data in a world racing toward quantum capability, this is the roadmap you cannot afford to postpone. Full Product DetailsAuthor: Claude Louis-CharlesPublisher: Cybersoft Publishers Imprint: Cybersoft Publishers Dimensions: Width: 15.20cm , Height: 1.60cm , Length: 22.90cm Weight: 0.531kg ISBN: 9781972752647ISBN 10: 1972752642 Pages: 270 Publication Date: 14 October 2024 Audience: General/trade , General Format: Hardback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||