Зарегистрироваться
Восстановить пароль
FAQ по входу

Radanliev P. Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity (Early Release)

  • Файл формата zip
  • размером 12,46 МБ
  • содержит документ формата epub
  • Добавлен пользователем
  • Описание отредактировано
Radanliev P. Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity (Early Release)
Pearson, 2025. – 280 p. – (Early Release). – ISBN 978-0135436004.
The rise of Quantum Computing and Artificial General Intelligence (AGI) is set to redefine the digital world. While these advancements promise revolutionary progress, they also pose unprecedented security threats–with the power to break today’s encryption and manipulate digital identities at scale.
Without proactive defense strategies, bank accounts, government records, and private data could become vulnerable to breaches that no existing security system can withstand.
The Solution: Quantum-Resistant Security
In Post-Quantum Security for AI, industry expert Petar Radanliev delivers a comprehensive guide to protecting digital infrastructure in an era where quantum computing and AI-driven cyber threats are rapidly evolving.
Through a structured exploration, the first chapter studies the concept of the technological singularity, a moment when Artificial General Intelligence (AGI) surpasses human cognitive capabilities. This chapter introduces key theoretical perspectives, such as Vernor Vinge’s singularity hypothesis and Ray Kurzweil’s projections, while analyzing the incremental steps leading toward AGI. It highlights the convergence of AGI and quantum computing as a pivotal dual-threat scenario and underscores the vulnerabilities of centralized systems and biometric authentication in this context. The discussion frames the singularity not only as a technological milestone but also as a societal phenomenon with profound implications for digital security, identity verification, and ethical governance.
Chapter 2 builds on this foundation by examining the transformative potential and existential risks associated with quantum computing. It provides a detailed overview of quantum principles, such as superposition and entanglement, and their applications in quantum algorithms like Shor’s and Grover’s. By analyzing the vulnerabilities of existing cryptographic systems and exploring quantum-resistant technologies, this chapter outlines the technical challenges of securing digital infrastructures in a quantum-enabled future. It further explores the integration of advanced cryptographic methods (such as lattice-based cryptography, zero-knowledge proofs, and homomorphic encryption) into blockchain platforms and decentralized systems, offering a glimpse into possible pathways toward resilience.
Preface
Part I: Introduction to the Technological Threats
Chapter 1, Understanding the Technological Singularity
Chapter 2, Quantum Computing and Its Implications
Part II: Defining the Concept of Digital Security by Design
Chapter 3, Current Digital Security Systems,
Chapter 4, The Opportunities and Risks from Artificial General Intelligence (AGI) in Cybersecurity
Part III: Quantum-Resistant Cryptography
Chapter 5, Post-Quantum Cryptography: The New NIST Standards
Chapter 6, Implementing Quantum-Safe Solutions
Part IV: Defending Against AGI Threats
Chapter 7, AI-Driven Defenses and Threat Mitigation
Chapter 8, Securing Digital Identities in an AGI World
Part V: The Future of Digital Security
Chapter 9, Future-Proofing Digital Security Systems
Chapter 10, Case Studies and Practical Tools
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация