CARVIEW |

Recently Visited
Top Categories
All Categories
Top Categories
Fiction
Nonfiction
Recently Visited
Recently Visited
Recently Visited
Memberships
Recently Visited
Recently Visited

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto 1st Edition
Purchase options and add-ons
Will your organization be protected the day a quantum computer breaks encryption on the internet?
Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day―HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication―will be virtually useless. . . unless you prepare.
Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:
- Gives a simple quantum mechanics primer
- Explains how quantum computing will break current cryptography
- Offers practical advice for preparing for a post-quantum world
- Presents the latest information on new cryptographic methods
- Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.
- ISBN-101119618193
- ISBN-13978-1119618195
- Edition1st
- PublisherWiley
- Publication dateNovember 12, 2019
- LanguageEnglish
- Dimensions7.4 x 0.6 x 9.2 inches
- Print length272 pages
Frequently bought together

Customers who viewed this item also viewed
- Post-Quantum Cryptography: Securing the Future of Digital CommunicationsPaperbackINR 963.21 shipping
- Post-quantum Cryptography: Defending Against Quantum Threats (Books on Tech)HardcoverINR 898.46 shippingGet it Oct 22 - Nov 10
Editorial Reviews
From the Inside Flap
Be protected the day quantum computing breaks encryption
Soon, if it hasn't happened already, someone with a quantum computer will break the encryption that secures passwords, user accounts, data, financial transactions, and every other aspect of digital life. Many of the current cryptographic methods, including HTTPS, TLS, WiFi protection, VPNs, and cryptocurrencies, will be rendered obsolete in an instant. In 2016, the National Institutes of Standards and Technology (NIST) said that all organizations should start preparing NOW for the coming quantum cryptographic break. Security professionals must heed that advice to prepare their organizations for the quantum computing security threat today.
Cryptography Apocalypse is an indispensable resource for every IT and InfoSec professional responsible for making appropriate decisions to meet the challenges of the coming quantum-computing revolution. Post-quantum crypto algorithms currently exist, but implementation will take time and more computing power. This invaluable guide provides real-world advice on where to best use current crypto technologies, explores how and when quantum computing will break existing crypto, and examines which applications are most likely to be broken in the near future. Written for anyone in the InfoSec world who needs to know if their security is ready for the day crypto breaksand how to fix itthis must-have guide will help you:
- Implement new post-quantum crypto to keep users, data, and infrastructure safe
- Discover how quantum computing will break current cryptography
- Know when the quantum crypto break will likely occur
- Become familiar with basic concepts of quantum mechanics
- Protect against security threats with existing solutions
- Stay up to date with the latest cryptographic methods
- Apply practical advice for preparing for a post-quantum world
- Understand digital encryption, authentication, and integrity hashing basics
- Explore new inventions and improvements beyond crypto quantum computing will produce
- Learn about many of the incredible things that quantum computing will bring us in the near future
From the Back Cover
Be protected the day quantum computing breaks encryption
Soon, if it hasn't happened already, someone with a quantum computer will break the encryption that secures passwords, user accounts, data, financial transactions, and every other aspect of digital life. Many of the current cryptographic methods, including HTTPS, TLS, WiFi protection, VPNs, and cryptocurrencies, will be rendered obsolete in an instant. In 2016, the National Institutes of Standards and Technology (NIST) said that all organizations should start preparing NOW for the coming quantum cryptographic break. Security professionals must heed that advice to prepare their organizations for the quantum computing security threat today.
Cryptography Apocalypse is an indispensable resource for every IT and InfoSec professional responsible for making appropriate decisions to meet the challenges of the coming quantum-computing revolution. Post-quantum crypto algorithms currently exist, but implementation will take time and more computing power. This invaluable guide provides real-world advice on where to best use current crypto technologies, explores how and when quantum computing will break existing crypto, and examines which applications are most likely to be broken in the near future. Written for anyone in the InfoSec world who needs to know if their security is ready for the day crypto breaks and how to fix it this must-have guide will help you:
- Implement new post-quantum crypto to keep users, data, and infrastructure safe
- Discover how quantum computing will break current cryptography
- Know when the quantum crypto break will likely occur
- Become familiar with basic concepts of quantum mechanics
- Protect against security threats with existing solutions
- Stay up to date with the latest cryptographic methods
- Apply practical advice for preparing for a post-quantum world
- Understand digital encryption, authentication, and integrity hashing basics
- Explore new inventions and improvements beyond crypto quantum computing will produce
- Learn about many of the incredible things that quantum computing will bring us in the near future
About the Author
Roger A. Grimes has worked in computer security for over 30 years, specializing in host and network protection, including cryptographic systems. As a professional penetration tester, he successfully broke into every company he was hired to hack into within an hour, with a single exception that took three hours. He has been the computer security columnist for InfoWorld and CSOOnline magazines since 2005. As evangelist for KnowBe4, the world's largest security awareness training vendor, Roger speaks at major security industry events worldwide.
Product details
- Publisher : Wiley
- Publication date : November 12, 2019
- Edition : 1st
- Language : English
- Print length : 272 pages
- ISBN-10 : 1119618193
- ISBN-13 : 978-1119618195
- Item Weight : 2.31 pounds
- Dimensions : 7.4 x 0.6 x 9.2 inches
- Best Sellers Rank: #716,271 in Books (See Top 100 in Books)
- #234 in Web Encryption
- #239 in Computer Cryptography
- #357 in Computer Hacking
- Customer Reviews:
About the author

Roger A. Grimes, CPA, CISSP, CEH, MCSE, CISA, CISM, CNE, yada, yada, is the author of 15 books and over 1,500 national magazine articles on computer security, specializing in host security and preventing hacker and malware attacks. Roger is a frequent speaker at national computer security conferences, was the weekly security columnist at InfoWorld and CSO magazines from 2005 - 2019, and former instructor and penetration tester for Foundstone. Roger is a Data-Driven Defense Evangelist at KnowBe4, Inc. He lives with his wife near Tampa, FL. When not working or writing, he can usually be found scuba diving or fishing in warm, azure blue waters.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book informative, particularly praising its explanations of past and current cryptography. They appreciate its readability, with one customer noting it makes you want to keep reading.
AI Generated from the text of customer reviews
Select to learn more
Customers find the book informative, providing a detailed explanation of past and current cryptography, with one customer noting it includes a basic high-level overview of quantum mechanics.
"...The book gives a great intro and basic high level explanation of quantum mechanics and how they relate to the QC...." Read more
"...It then details cryptography in exhaustive detail yet breaking it down in very simple to follow chapters and sub-chapters...." Read more
"This subject is so critical - worse than Y2K. Roger Grimes is not a quantum physicist but he's done so much research that he can explain everything..." Read more
"Roger Grimes does a great job in explaining to the layman, what Quantum Computing is...." Read more
Customers find the book readable, with one mentioning it's a must-read for IT professionals.
"This book was a very enjoyable read...." Read more
"...I found the book very informative and told in a way that makes you want to keep reading. Well done!" Read more
"...It's a great read and will also continue to function as a reference book in my daily I.T. work." Read more
"Fantastic book!..." Read more
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on January 30, 2025Format: PaperbackVerified PurchaseThis subject is so critical - worse than Y2K. Roger Grimes is not a quantum physicist but he's done so much research that he can explain everything in a way that you can get it (as much as anyone can get quantum mechanics!) The book not only explains what quantum mechanics is, but how quantum computers work, why they are a risk to today's encryption algorithms, and what we should be doing to prepare for the day quantum computers break all our encryption.
- Reviewed in the United States on April 2, 2020Format: PaperbackVerified PurchaseThis book was a very enjoyable read. As someone who works in cyber security and has had a growing interest in learning more about QCing and how it will effect today's cryptography this book looked very interesting.
The book gives a great intro and basic high level explanation of quantum mechanics and how they relate to the QC. Also gives explanation of past and current cryptography. The really valuable portion of this book is the last chapter which walks the reader through how a security professional would go about planning and preparing NOW for this "cryptography apocalypse" and how to bring this to the attention of upper management.
Overall I would say this is a MUST READ for IT professionals ESPECIALLY cyber security engineers and a very enjoyable read for anyone interested in quantum computers.
- Reviewed in the United States on February 19, 2020Format: PaperbackVerified PurchaseRoger Grimes does a great job in explaining to the layman, what Quantum Computing is. He then takes you on a journey as to how Quantum Computing will be used to break various forms of encryption. He also lets you know that the sky isn't falling (just yet) because there are steps you can take to keep your data encrypted (for now).
It's a well written book that you won't want to put down. I found the book very informative and told in a way that makes you want to keep reading. Well done!
- Reviewed in the United States on January 17, 2020Format: PaperbackVerified PurchaseThis book is exactly what I was looking for in trying to better understand quantum's role in the future (and present) of cryptography which is at the heart of modern cyber security. The book breaks down Quantum mechanics is a very easy to understand primer with good details on the hardware configurations for Quantum Computers. It then details cryptography in exhaustive detail yet breaking it down in very simple to follow chapters and sub-chapters. It's a great read and will also continue to function as a reference book in my daily I.T. work.
- Reviewed in the United States on December 31, 2019Format: PaperbackSeptember 3, 1967 is a day known as Dagen H (H day) in Sweden. On that day, all car traffic was switched from driving on the left-hand side of the road to the right side. It was the most significant logistical event to date, in the history of Sweden.
In the not too distant future, we may have what could be known as Q Day—the day in which quantum cryptography renders large swaths of traditional cryptography broken. In Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto (Wiley 978-1-119-61822-5), author Roger Grimes has written a remarkable book on how to prepare for that fateful day.
A few years ago, at RSA Conference, I asked Dr. Jane Melia of QuintessenceLabs, a quantum cryptography hardware, and software provider, why firms should consider purchasing their expensive products. She offered several reasons, one of which is that it was a hedge against broad quantum cryptography becoming mainstream, which would render much of a firm's secrets, quite public. How long that hedge will be is anyone's guess. But everyone agrees that it is inevitable.
While quantum mechanics is weird and quite unintuitive, Grimes does a great job of explaining it in layman's terms. He provides an excellent and readable introduction to the various areas of quantum mechanics and quantum physics.
There is a perception that once quantum computing becomes fully workable, it will break all cryptography. The book makes it clear that such is not that case, and details what quantum computers will be able to break, and what they won't be able to. In short, quantum computers will be able to break any cipher algorithm whose security relies on problems related to integer factorization, discrete logarithm, elliptic-curve or any other closely related mathematical problems. What quantum computers won't be able to break are symmetric ciphers such as AES, newer integrity hashes such as SHA-2 and SHA-3. The book lists in detail what ciphers and algorithms are at risk.
While Dagen H happened overnight, Grimes writes that most changes won't happen instantly, but will occur across a multitude of timelines based on different use cases and applications. Some will be in weeks, others in months and years. But far-reaching monumental changes are coming.
The first part of the book is introductory and theoretical, but the rest of the book is highly practical. Grimes lays out the various use cases and concrete steps one needs to take to ensure they are not blindsided by the upcoming advent of quantum cryptography. One may take the naïve approach to throw out all of their quantum vulnerable crypto and replace it with quantum-resistant solutions. But Grimes writes that one has to approach that method with caution for several reasons. Rushing prematurely into the world of quantum cryptography will likely not make things much better.
To that, the book details how one should adequately prepare for the quantum apocalypse. It lists four major post-quantum mitigation phases and six major post-quantum mitigation project steps. It also mentions numerous vendors currently active in the quantum cryptography space.
The question everyone in information security has to ask is this: Will your organization be protected the day a quantum computer breaks encryption? For those who want to answer that in the positive, Cryptography Apocalypse has all that you need to know to answer in the positive. The book provides the reader with nearly everything they need to know on the topic and is an essential and unique reference on the subject.
- Reviewed in the United States on December 29, 2019Format: KindleFirst: I like Roger's writing style. Conversational and easy to read; Roger can take very complex concepts and present them simply.
Second: Quantum computers will have a huge impact on the future. What transistors did to tubes and silicone chips did to transistors probably doesn't approach the order of magnitud what quantum computers will do to regular computers. They're not here yet but they're just around the corner and will quickly obsolete many standard security best practices. My take-away from this book is that you dont necessarily need to know HOW quantum computers work but you do need to know THAT they work and how plan accordingly. It's interesting that what causes the cryptography apocalypse might be it's resurrection.
- Reviewed in the United States on December 2, 2019Format: PaperbackCryptography Apocalypse is a phenomenal read for anyone that wants to learn about Quantum Computers and how to prepare for the day of reckoning that's dead ahead. Quantum Supremacy is something everyone needs to understand how the post Quantum-era will impact your life and how it impacts America, both good and bad. Roger Grimes makes the complexity of Quantum Computers easy to understand and fun to read.
Ron Coby
Author of Discover the Upside of Down
Top reviews from other countries
- JoeReviewed in Australia on August 9, 2023
4.0 out of 5 stars A useful book.
Format: PaperbackVerified PurchaseI have been working with PKI, and cryptography as architecture components and, separately, as a hobbyist, trying to learn how quantum mechanics works for around 25 years. I found this book brings these fields together nicely in an easy read.
Newcomers will get a peek at the scope and depth of the field(s) and the experienced may find it provides a helpful refresh in a convenient package.
![]() |
Amazon Music
Stream millions
of songsAmazon Ads
Reach customers
wherever they
spend their time6pm
Score deals
on fashion brandsAbeBooks
Books, art
& collectiblesACX
Audiobook Publishing
Made EasySell on Amazon
Start a Selling AccountVeeqo
Shipping Software
Inventory Management
Amazon Business
Everything For
Your BusinessAmazonGlobal
Ship Orders
InternationallyAmazon Web Services
Scalable Cloud
Computing ServicesAudible
Listen to Books & Original
Audio PerformancesBox Office Mojo
Find Movie
Box Office DataGoodreads
Book reviews
& recommendationsIMDb
Movies, TV
& Celebrities