Post-quantum cryptography is not a future upgrade. It is a structural migration of trust happening now, beneath the surface of enterprise systems that continue to operate on borrowed certainty.
This book confronts a dissonance most organizations ignore: the mathematical threat is settled, yet institutional response remains provisional. While RSA and elliptic-curve cryptography still protect your transactions, quantum algorithms have already invalidated their foundational assumptions. The question is no longer if migration is necessary, but how to execute it when cryptographic transitions are irreversible, organizationally complex, and legally fraught.
Drawing from real systems, legacy constraints, and governance failures, this text examines post-quantum preparation as institutional self-knowledge rather than mere technical substitution. It analyzes why standards bodies hesitate, why vendors oversell, and why rational action feels impossible when delay carries asymmetric, cumulative costs.
You will encounter hybrid compromises, partial migrations, and the uncomfortable reality that cryptographic breakage never announces itself politely. Above all, you will learn to make defensible decisions under scrutiny-technical, legal, and historical-without the comfort of complete certainty.
Key Insights
- Why your current cryptographic inventory is likely invisible to executive leadership-and how to render it visible- The structural constraints that cause institutions to defer rational preparation until remediation becomes impossible- How quantum threats invalidate not just specific algorithms, but the entire threat model underlying modern public-key infrastructure- Why "crypto-agility" often masks organizational paralysis rather than enabling genuine responsiveness- The legal and supply-chain entanglements that make cryptographic migration a decades-long institutional memory problem- How to evaluate post-quantum candidates when historical precedent suggests today's confidence may precede tomorrow's cryptanalysis- What "preparation" actually means when the adversary capability is already present but the breach is not
The data you protect today will outlive your current cryptographic standards. Read this book before your organization's cryptographic debt becomes a liability you cannot remediate.
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。