•  Retrait en 2 heures
  •  Assortiment impressionnant
  •  Paiement sécurisé
  •  Toujours un magasin près de chez vous
  •  Retrait gratuit dans votre magasin Club
  •  7.000.0000 titres dans notre catalogue
  •  Payer en toute sécurité
  •  Toujours un magasin près de chez vous
  1. Accueil
  2. Livres
  3. Savoirs
  4. Informatique
  5. Sécurité informatique
  6. Data Encryption at the Intersection of Mathematics and Physics

Data Encryption at the Intersection of Mathematics and Physics

Comparing Physical Methods of Cryptography

Ernst Piller, Hubert Schölnast
32,45 €
+ 64 points
Livraison sous 1 à 4 semaines
Passer une commande en un clic
Payer en toute sécurité
Livraison en Belgique: 3,99 €
Livraison en magasin gratuite

Description

Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and computer scientists. Anyone involved in procurement in this field makes decisions about algorithms, technologies, and providers, and thus also about infrastructure and security. The generation and distribution of keys for data encryption play a central role in this. Because security assessments for mathematical methods are based on assumptions, physical methods are becoming interesting in the high-security sector. They promise to link security more closely to the laws of nature. This raises the key question: Which technology is suitable for which application scenario, and what assumptions, costs, and operational risks are involved?

This book provides answers and, for the first time, compares QKD (Quantum Key Distribution), RKD (Radio-signal Key Distribution), and MKD (Memory Key Distribution) within a common, transparent criteria framework: technology-neutral, practical, and easy to understand. The evaluation covers secret key rates, range/attenuation, robustness, costs, infrastructure, portability, standardization, IT security, and security risks (implementation, integration, post-processing, side channels). The evaluations are deliberately presented not as a ranking, but as a decision-making aid.

The book will be published in print and as open access.

QKD derives its security from the laws of quantum physics, but secret key rates decrease with increasing attenuation. Key management systems connect short QKD distances over longer distances, but only at the cost of additional attack surfaces ("trusted nodes"). Its use for mobile applications fails due to a lack of technical maturity. Very high financial costs and high maintenance requirements for QKD solutions make them unattractive in high-security environments.

RKD utilizes the reciprocal physical properties of a radio link and scores points for its low technical complexity, excellent suitability for mobile applications (e.g., vehicles or drones), and very low costs. However, RKD falls far short of the key rates achieved by QKD solutions and is still limited to shorter distances. In addition, there is no established infrastructure for distributing key material to more than two partners.

MKD takes a completely different approach: each party produces key material, stores it on a data carrier, and transports it physically to the other party. Because MKD can securely transfer 16 TB of key material in a single transport, only MKD has the potential to continuously provide a one-time pad (OTP) and thus provably 100% secure data encryption. The price is organizational responsibility: secure generation, storage, transport, and documented chain of custody.

The book examines data security for telecommunications and data storage, discusses encryption modes for OTP, and addresses the question of when "OTP proximity" makes more sense than theoretical purity. The result of approximately one year of source-critical research and the comparison of literature, manufacturer specifications, and practical observations with systematic cross-checking and our own R&D activities, this book helps to justify architecture and procurement decisions, locate risks (side channels, misconfigurations, logistical vulnerabilities), and separate "security gains" from "new attack surfaces."

Spécifications

Parties prenantes

Auteur(s) :
Editeur:

Contenu

Nombre de pages :
156
Langue:
Anglais
Collection :

Caractéristiques

EAN:
9783032247636
Date de parution :
17-06-2026
Format:
Livre broché
Format numérique:
Trade paperback (VS)
Dimensions :
155 mm x 235 mm
Librairie Club

Seulement chez Librairie Club

+ 64 points sur votre carte client de Librairie Club
Cadeau

Uniquement dans nos magasins : paire de chaussettes offerte

à l'achat d'un livre YA ou d'un jeu participant
Cadeau
Paire de chaussettes offerte
Cadeau

Uniquement dans nos magasins : kit créatif offert

à l'achat d'un livre jeunesse ou d'un jeu participant
Cadeau
Kit créatif chouette
Standaard Boekhandel

Les avis

Nous publions uniquement les avis qui respectent les conditions requises. Consultez nos conditions pour les avis.