量子安全:信息保護新紀元
Chahot
- 出版商: 電子工業
- 出版日期: 2024-07-01
- 售價: $768
- 貴賓價: 9.5 折 $730
- 語言: 簡體中文
- 頁數: 452
- ISBN: 7121481367
- ISBN-13: 9787121481369
-
相關分類:
量子 Quantum
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$301區塊鏈核心算法解析
-
$714$678 -
$534$507 -
$454區塊鏈原理、設計與應用
-
$407使用 Raspberry Pi 學習電腦體系結構 (Learning Computer Architecture with Raspberry Pi)
-
$750$593 -
$520$411 -
$888$844 -
$420$378 -
$539$512 -
$600$468 -
$653機器學習圖解
-
$534$507 -
$3,510$3,335 -
$299$284 -
$2,150$2,043 -
$653多因素身份驗證攻防手冊
-
$599$569 -
$599$569 -
$594$564 -
$599$569 -
$594$564 -
$720$684 -
$528$502 -
$2,660$2,520
相關主題
商品描述
本書從經典信息安全框架開始詳細闡述了網絡安全的核心概念、關鍵技術及其應用,並對以量子密鑰分發、量子隱態傳輸、超密編碼等為代表的量子安全技術進行了深入的解析,以實際案例和故事為基礎,增強了內容的趣味性和實用性,最後還揭示了前沿量子安全技術的研究成果與方向。作為量子安全領域的先鋒之作,本書既滿足了日益增長的信息安全需求,又為量子安全技術的普及和發展鋪墊了基礎。無論你是對量子安全感興趣的普通讀者,還是在相關領域深入研究的專家,本書都將為你提供寶貴的知識和啟示。
目錄大綱
目錄
1 信息安全與密碼學.....................................................1
1.1 信息安全............................................................1
1.1.1 信息保護.......................................................1
1.1.2 加密與解密:安全的基本機制....................................4
1.1.3 信息安全教育與非設計機制安全..................................9
1.2 現代密碼學..........................................................10
1.2.1 密碼學的基礎:異或運算........................................10
1.2.2 對稱加密.......................................................11
1.2.3 非對稱加密.....................................................23
1.2.4 密鑰與隨機數...................................................34
1.3 現代密碼類型.......................................................41
1.3.1 分組密碼.......................................................41
1.3.2 流密碼.........................................................53
1.4 現代網絡安全通信體系.............................................58
1.4.1 混合密碼系統...................................................58
1.4.2 單向哈希函數...................................................60
1.4.3 消息認證碼.....................................................65
1.4.4 數字簽名.......................................................68
1.4.5 有公信力的認證機關............................................70
1.4.6 基於現代密碼學的網絡安全通信體系.............................72
2 網絡安全:信息安全的應用..........................................75
2.1 信息安全評價標準..................................................75
2.1.1 基於信息論的安全概念..........................................75
2.1.2 商業環境中的安全部署規則......................................79
2.1.3 黑盒、灰盒和白盒攻擊模型......................................81
2.2 網絡安全威脅.......................................................82
2.2.1 多樣的網絡攻擊.................................................82
2.2.2 惡意軟件.......................................................86
2.2.3 現代網絡攻擊展望...............................................90
2.3 變遷的網絡環境.....................................................92
2.3.1 物聯網.........................................................93
2.3.2 智慧城市.......................................................95
2.3.3 元宇宙.........................................................97
3 量子計算基礎...........................................................100
3.1 線性代數與量子力學................................................100
3.1.1 波與粒子.......................................................100
3.1.2 量子態與波函數.................................................103
3.1.3 內積、外積和張量積............................................109
3.1.4 量子算符——泡利矩陣..........................................114
3.1.5 量子門與量子電路...............................................116
3.1.6 量子現象——量子疊加、量子乾涉、量子糾纏.....................121
3.1.7 量子相位.......................................................124
3.1.8 量子相位翻轉與相位反沖........................................127
3.2 量子電腦..........................................................133
3.2.1 量子計算的物理量...............................................134
3.2.2 量子電腦的硬件框架..........................................137
3.2.3 量子計算的實現方式............................................139
3.2.4 量子電腦的差錯校驗..........................................141
3.2.5 DiVinecnzo 標準................................................142
4 量子技術發展動態.....................................................148
4.1 國內量子技術現狀..................................................148
4.1.1 isQ-Core 與青果................................................149
4.1.2 本源量子.......................................................150
4.1.3 華翊量子.......................................................151
4.1.4 圖靈量子.......................................................153
4.1.5 量旋科技.......................................................153
4.1.6 未磁科技.......................................................154
4.1.7 其他機構的發展動態............................................155
4.1.8 量子安全相關產業動態..........................................157
4.2 國際量子技術現狀..................................................158
4.2.1 Cirq............................................................160
4.2.2 Qiskit ..........................................................161
4.2.3 Q# ............................................................162
4.3 量子計算對信息安全體系的影響及對全球安全環境的展望........163
4.3.1 後量子安全的前沿研究..........................................163
4.3.2 量子時代信息安全面臨的挑戰....................................164
4.3.3 量子革新與信息安全:從諾貝爾獎到全球技術競爭................166
4.3.4 近期量子通信與安全領域投融資分析.............................167
4.3.5 量子安全部署場景與重點行業應用................................168
5 量子編程實踐...........................................................171
5.1 基於圖形可視化界面的量子編程簡單方法.........................171
5.1.1 IBM Quantum ..................................................171
5.1.2 IBM Quantum Composer ........................................178
5.1.3 基於圖形可視化界面的量子編程案例.............................181
5.2 基於Qiskit 的量子編程進階方法..................................185
5.2.1 基於Qiskit 的量子編程概論.....................................185
5.2.2 Qiskit 的安裝與配置............................................186
5.2.3 基於Qiskit 的量子編程案例.....................................195
5.3 應用實戰:通過量子編程計算π ...................................202
5.3.1 量子傅里葉變換.................................................203
5.3.2 量子相位估計...................................................208
5.3.3 基於QPE 的π 推算程序........................................217
6 量子算法.....................................................·.........224
6.1 Grover 算法.........................................................224
6.1.1 數據檢索與Grover 算法.........................................224
6.1.2 編程實踐:基於Grover 算法的量子秘密推測......................232
6.1.3 編程實踐:基於Grover 算法的量子優化..........................237
6.2 差錯校驗與量子糾錯算法...........................................244
6.2.1 量子糾錯:量子比特翻轉糾錯....................................245
6.2.2 量子糾錯:相位翻轉糾錯........................................248
6.3 Shor 算法...........................................................251
6.3.1 Shor 算法對RSA 的威脅........................................252
6.3.2 Shor 算法實踐:簡單的因子分解.................................256
6.4 量子隨機游走算法..................................................261
6.4.1 隨機游走算法與量子隨機游走算法................................261
6.4.2 量子隨機游走算法實例..........................................264
7 量子安全與量子網絡通信.............................................273
7.1 量子安全基礎.......................................................273
7.1.1 量子隨機數生成器...............................................274
7.1.2 量子態判定和量子完整性驗證的安全性分析.......................276
7.2 量子安全與通信.....................................................277
7.2.1 量子隱態傳輸...................................................277
7.2.2 量子超密通信...................................................289
7.2.3 量子無條件安全通信............................................294
7.2.4 量子密鑰分發...................................................295
7.2.5 量子安全認證...................................................307
7.2.6 量子隱寫術.....................................................313
7.3 量子中繼與量子網絡................................................322
7.4 量子因特網的未來展望與挑戰......................................329
8 下一代密碼技術........................................................335
8.1 輕量級密碼..........................................................335
8.1.1 TinyJAMBU....................................................336
8.1.2 Ascon ..........................................................342
8.1.3 ACORN ........................................................345
8.1.4 AEGIS-128 .....................................................346
8.1.5 Deoxys-II.......................................................348
8.2 同態加密............................................................351
8.2.1 同態加密的概念.................................................351
8.2.2 對抗模型的分類.................................................354
8.2.3 同態密碼的實現方式............................................356
8.2.4 同態密碼的效率瓶頸............................................365
8.2.5 量子同態加密...................................................366
8.3 零知識證明..........................................................368
8.4 安全多方計算.......................................................371
8.5 下一代密碼學技術與量子安全......................................375
9 後量子安全與後量子密碼.............................................381
9.1 後量子安全..........................................................381
9.1.1 基於哈希函數的後量子密碼......................................382
9.1.2 基於格的後量子密碼............................................384
9.1.3 基於編碼理論的後量子密碼......................................385
9.1.4 基於多變量多項式方程的後量子密碼.............................386
9.2 後量子密碼推薦與候補.............................................388
9.2.1 Classic McEliece ................................................390
9.2.2 CRYSTALS-KYBER ............................................392
9.2.3 NTRU .........................................................393
9.2.4 SABER ........................................................394
9.2.5 CRYSTALS-DILITHIUM........................................394
9.2.6 FALCON .......................................................396
9.2.7 Rainbow........................................................397
9.2.8 BIKE ..........................................................399
9.2.9 FrodoKEM .....................................................399
9.2.10 HQC ..........................................................400
9.2.11 NTRUPrime...................................................401
9.2.12 SIKE..........................................................402
9.2.13 GeMSS........................................................403
9.2.14 Picnic .........................................................405
9.2.15 SPHINCS+....................................................407
10 量子安全前沿技術簡述..............................................410
10.1 量子一次性密碼...................................................410
10.2 量子安全幽靈成像.................................................415
10.3 量子安全區塊鏈...................................................418
10.3.1 量子哈希函數..................................................419
10.3.2 量子數字簽名..................................................420
10.3.3 量子通信與共識機制...........................................422
10.4 量子機器學習......................................................424
附錄A 量子計算相關術語和編譯環境語言問題....................428
1. 量子計算相關術語.....................................................428
2. 編譯環境語言問題.....................................................432
附錄B IBM 更新說明.................................................434
1. 雲模擬器的退役........................................................434
2. IBM Quantum Lab 的退役...........................................435