Bis zu 50 % günstiger als neu 3 Jahre rebuy Garantie Professionelles Refurbishment
ElektronikMedien
Tipps & News
AppleAlle anzeigen
TabletsAlle anzeigen
HandyAlle anzeigen
Fairphone
AppleAlle anzeigen
iPhone Air Generation
GoogleAlle anzeigen
Pixel Fold
HonorAlle anzeigen
HuaweiAlle anzeigen
Honor SerieY-Serie
NothingAlle anzeigen
OnePlusAlle anzeigen
OnePlus 11 GenerationOnePlus 12 Generation
SamsungAlle anzeigen
Galaxy XcoverWeitere Modelle
SonyAlle anzeigen
Weitere Modelle
XiaomiAlle anzeigen
Weitere Modelle
Tablets & eBook ReaderAlle anzeigen
Google
AppleAlle anzeigen
HuaweiAlle anzeigen
MatePad Pro Serie
MicrosoftAlle anzeigen
XiaomiAlle anzeigen
Kameras & ZubehörAlle anzeigen
ObjektiveAlle anzeigen
System & SpiegelreflexAlle anzeigen
WearablesAlle anzeigen
Fitness TrackerAlle anzeigen
SmartwatchesAlle anzeigen
Xiaomi
Konsolen & ZubehörAlle anzeigen
Lenovo Legion GoMSI Claw
NintendoAlle anzeigen
Nintendo Switch Lite
PlayStationAlle anzeigen
XboxAlle anzeigen
Audio & HiFiAlle anzeigen
KopfhörerAlle anzeigen
FairphoneGoogle
LautsprecherAlle anzeigen
Beats by Dr. DreGoogleYamahatonies
iPodAlle anzeigen

Handgeprüfte Gebrauchtware

Bis zu 50 % günstiger als neu

Der Umwelt zuliebe

Data Encryption at the Intersection of Mathematics and Physics

Ernst Piller, Hubert Schölnast (Broschiert, Englisch)

Keine Bewertungen vorhanden
Optischer Zustand
Beschreibung
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and computer scientists. Anyone involved in procurement in this field makes decisions about algorithms, technologies, and providers, and thus also about infrastructure and security. The generation and distribution of keys for data encryption play a central role in this. Because security assessments for mathematical methods are based on assumptions, physical methods are becoming interesting in the high-security sector. They promise to link security more closely to the laws of nature. This raises the key question: Which technology is suitable for which application scenario, and what assumptions, costs, and operational risks are involved? This book provides answers and, for the first time, compares QKD (Quantum Key Distribution), RKD (Radio-signal Key Distribution), and MKD (Memory Key Distribution) within a common, transparent criteria framework: technology-neutral, practical, and easy to understand. The evaluation covers secret key rates, range/attenuation, robustness, costs, infrastructure, portability, standardization, IT security, and security risks (implementation, integration, post-processing, side channels). The evaluations are deliberately presented not as a ranking, but as a decision-making aid. The book will be published in print and as open access. QKD derives its security from the laws of quantum physics, but secret key rates decrease with increasing attenuation. Key management systems connect short QKD distances over longer distances, but only at the cost of additional attack surfaces ("trusted nodes"). Its use for mobile applications fails due to a lack of technical maturity. Very high financial costs and high maintenance requirements for QKD solutions make them unattractive in high-security environments. RKD utilizes the reciprocal physical properties of a radio link and scores points for its low technical complexity, excellent suitability for mobile applications (e.g., vehicles or drones), and very low costs. However, RKD falls far short of the key rates achieved by QKD solutions and is still limited to shorter distances. In addition, there is no established infrastructure for distributing key material to more than two partners. MKD takes a completely different approach: each party produces key material, stores it on a data carrier, and transports it physically to the other party. Because MKD can securely transfer 16 TB of key material in a single transport, only MKD has the potential to continuously provide a one-time pad (OTP) and thus provably 100% secure data encryption. The price is organizational responsibility: secure generation, storage, transport, and documented chain of custody. The book examines data security for telecommunications and data storage, discusses encryption modes for OTP, and addresses the question of when "OTP proximity" makes more sense than theoretical purity. The result of approximately one year of source-critical research and the comparison of literature, manufacturer specifications, and practical observations with systematic cross-checking and our own R&D activities, this book helps to justify architecture and procurement decisions, locate risks (side channels, misconfigurations, logistical vulnerabilities), and separate "security gains" from "new attack surfaces."
Dieses Produkt haben wir gerade leider nicht auf Lager.
ab 24,99 €
Derzeit nicht verfügbar
Derzeit nicht verfügbar

Handgeprüfte Gebrauchtware

Bis zu 50 % günstiger als neu

Der Umwelt zuliebe

Technische Daten


Erscheinungsdatum
17.06.2026
Sprache
Englisch
EAN
9783032247636
Herausgeber
Springer International Publishing
Serien- oder Bandtitel
SpringerBriefs in Information Security and Cryptography
Sonderedition
Nein
Autor
Ernst Piller, Hubert Schölnast
Seitenanzahl
156
Einbandart
Broschiert
Buch Untertitel
Comparing Physical Methods of Cryptography
Schlagwörter
Open Access, Quantum key distribution, Physical layer security, Data encryption, Physical cryptography, Key management
Thema-Inhalt
UR - Computersicherheit UTN - Netzwerksicherheit GPJ - Kodierungstheorie und Verschlüsselung (Kryptologie) URY - Kryptografie, Verschlüsselungstechnologie UN - Datenbanken PHQ - Quantenphysik (Quantenmechanik und Quantenfeldtheorie)
Höhe
235 mm
Breite
15.5 cm

Hersteller: Springer Nature Customer Service Center GmbH, Europaplatz 3, Heidelberg, Deutschland, 69115, ProductSafety@springernature.com

Warnhinweise und Sicherheitsinformationen

Informationen nach EU Data Act

-.-
Leider noch keine Bewertungen
Leider noch keine Bewertungen
Schreib die erste Bewertung für dieses Produkt!
Wenn du eine Bewertung für dieses Produkt schreibst, hilfst du allen Kund:innen, die noch überlegen, ob sie das Produkt kaufen wollen. Vielen Dank, dass du mitmachst!