Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Prepare for the future of cybersecurity--where quantum computing and AGI collide to reshape the rules of digital defense.
Quantum computing and Artificial General Intelligence (AGI) are poised to revolutionize the digital world--but they also introduce unprecedented security risks. These advancements have the potential to break modern encryption, manipulate digital identities, and bypass traditional cybersecurity defenses, leaving financial systems, government records, and private data dangerously exposed.
In Post-Quantum Security for AI, industry expert Petar Radanliev provides a comprehensive guide to safeguarding digital infrastructure against quantum and AI-driven cyber threats. This essential resource explores the vulnerabilities posed by quantum computing, the evolving risks of AGI, and the next-generation cryptographic solutions designed to counteract them. Readers will gain insight into quantum-resistant encryption, decentralized digital identity management, blockchain security strategies, and real-world implementation frameworks for enterprises and governments.
With a unique dual focus on AGI and quantum threats--areas often treated separately--this book delivers practical, forward-looking security strategies backed by case studies and expert analysis. Whether you're a cybersecurity professional, IT leader, policymaker, cryptographer, or developer, this book equips you with the critical knowledge and tools to navigate the future of digital security. The security landscape is changing fastare you ready for it?
The security landscape is evolving--equip yourself now, before the future arrives unencrypted.
Preface.. . . . . . . . . . . . . . . . . xv
PART I Introduction to the Technological Threats.. . . . . . . . 1
Chapter 1 Understanding the Technological Singularity.. . . . . . . 3
Objectives.. . . . . . . . . . . . . . 3
Technological Singularity.. . . . . . . . . . . 4
Defining the Technological Singularity. . . . . . . . . 5
The Evolution of AGI.. . . . . . . . . . . . 8
Risk of the Singularity.. . . . . . . . . . . . 11
Summary. . . . . . . . . . . . . . 18
References. . . . . . . . . . . . . . 19
Chapter 2 Quantum Computing and Its Implications.. . . . . . . 27
Objectives.. . . . . . . . . . . . . . 27
Basics of Quantum Computing. . . . . . . . . . 28
Quantum Computings Threat to Cryptography.. . . . . . . 29
Future of Quantum Technologies: Comparative Analysis.. . . . . 40
Summary. . . . . . . . . . . . . . 42
References. . . . . . . . . . . . . . 43
PART II Defining the Concept of Digital Security by Design.. . . . . 51
Chapter 3 Current Digital Security Systems.. . . . . . . . . . 53
Objectives.. . . . . . . . . . . . . . 53
Overview of Digital Identity Systems.. . . . . . . . . 54
Public-Key Infrastructure (PKI) and Its Limitations.. . . . . . 60
Decentralized Security Models: Blockchain and Beyond. . . . . 65
Summary. . . . . . . . . . . . . . 70
References. . . . . . . . . . . . . . 70
Chapter 4 The Opportunities and Risks Related to Artificial General Intelligence (AGI) in Cybersecurity.. . 79
Objectives.. . . . . . . . . . . . . . 79
AGI Capabilities in Autonomous Attacks. . . . . . . . 80
How AGI Poses Unique Security Threats.. . . . . . . . 86
Case Studies of AI-Driven Cyberattacks. . . . . . . . . 89
Summary. . . . . . . . . . . . . . 99
References. . . . . . . . . . . . . . 99
PART III Quantum-Resistant Cryptography.. . . . . . . . . 105
Chapter 5 Post-Quantum Cryptography: The New NIST Standards.. . . . 107
Objectives.. . . . . . . . . . . . . . 107
Lattice-Based Cryptography.. . . . . . . . . . 108
Ring Learning with Errors.. . . . . . . . . . . 114
NIST Standards for Post-Quantum Cryptography.. . . . . . 122
Case Study: Behavioral Analysis with Falcon X AI: Analyzing Advanced Quantum Malware Strains.. . 127
Summary. . . . . . . . . . . . . . 144
References. . . . . . . . . . . . . . 145
Chapter 6 Implementing Quantum-Safe Solutions.. . . . . . . . 151
Objectives.. . . . . . . . . . . . . . 151
Practical Deployment of Post-quantum Algorithms. . . . . . 152
Overcoming Challenges in Quantum-Safe Implementations.. . . . 161
Scalability and Efficiency in Quantum-Safe Systems. . . . . . 171
Case Study on PQC and Emerging AI Threats.. . . . . . . 177
Summary. . . . . . . . . . . . . . 193
References. . . . . . . . . . . . . . 194
PART IV Defending Against AGI Threats.. . . . . . . . . . 199
Chapter 7 AI-Driven Defenses and Threat Mitigation.. . . . . . . 201
Objectives.. . . . . . . . . . . . . . 201
AI and Machine Learning in Cybersecurity.. . . . . . . . 202
Using AI to Defend Against AI: Generative Adversarial Networks. . . 203
Generative AI for Cybersecurity: Practical Applications and Code Demonstrations. . 204
Reinforcement Learning for AGI Threat Mitigation. . . . . . 208
Case Study on AI and Machine Learning in Cybersecurity: Static Analysis with DeepCode AI (Snyk).. . 210
Summary. . . . . . . . . . . . . . 222
References. . . . . . . . . . . . . . 223
Chapter 8 Securing Digital Identities in an AGI World.. . . . . . . 229
Objectives.. . . . . . . . . . . . . . 229
Decentralized Digital Identity Systems.. . . . . . . . 230
Zero-Knowledge Proofs and Homomorphic Encryption. . . . . 233
Blockchain for Identity Verification.. . . . . . . . . 239
Case Study: Open-Source Alternatives for AI-Driven Malware Analysis and Threat Detection... . 243
Summary. . . . . . . . . . . . . . 263
References. . . . . . . . . . . . . . 264
PART V The Future of Digital Security. . . . . . . . . . 271
Chapter 9 Future-Proofing Digital Security Systems. . . . . . . 273
Objectives.. . . . . . . . . . . . . . 273
Preparing for Life Post-Singularity. . . . . . . . . 274
Roadmap for Quantum and AGI-Safe Infrastructure. . . . . . 276
Regulatory and Ethical Considerations. . . . . . . . 278
Case Study: Hybrid Analysis 2.0 for AI Malware Analysis and Enhanced
Threat Detection. . . . . . . . . . . . . 279
Summary. . . . . . . . . . . . . . 292
References. . . . . . . . . . . . . . 293
Chapter 10 Adapting to the Future: Quantum and AGI Security Requirements.. 299
Objectives.. . . . . . . . . . . . . . 299
Quantum-Resistant and AGI-Safe Solutions.. . . . . . . 300
Practical Implementation of Post-Quantum Cryptographic Standards. . 301
Summary. . . . . . . . . . . . . . 306
References. . . . . . . . . . . . . . 306
9780135435922, TOC, 5/28/25