Preface
In this age of high connectivity, cloud computing, ransomware, and hackers, digital assets are changing the way we live our lives. And so, cryptography and cybersecurity are crucial. The changes in processing and storing data have required adequate evolution in cryptographic algorithms to advance in the eternal battle against information piracy.
Starting from the basics of symmetric and asymmetric algorithms, I will describe the modern techniques of authentication, transmission, and searching used on encrypted data to shelter it from spies and hackers. You’ll encounter algorithms with zero-knowledge protocols, elliptic curves, homomorphic search, and quantum cryptography.
The possibilities of quantum cryptography continue to grow and will break measures previously thought to be secure. Innovations in quantum cryptography are at the forefront of cryptographic thought, so in this second edition, I have endeavored to give you a primer in quantum cryptography and an early introduction to quantum search, looking at the Grover algorithm.
I see this book as a tool for students and professionals who want to focus on the next generation of cryptography algorithms. I want to help you be aware of the modern developments in cryptography, but first, my focus is on teaching the mathematical logic of these algorithms to help you understand the fundamentals. As you go through the book, I’m hoping you’ll gradually find what areas of practical implementation would interest you most in your career.