Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
16.5.8.Zarządzaniekluczamiicertyfikatami............................................169
16.5.8.1.FAZAINICJUJĄCAśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś170
16.5.8.2.FAZAWYDAWANIAśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś172
16.5.8.3.FAZAUNIEWAŻNIANIAśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś173
16.5.9.Weryfikacjacertyfikatów......................................................174
16.5.10.Unieważnianiecertyfikatów....................................................175
16.5.11.Modelezaufania.............................................................176
16.5.11.1.Modelhierarchicznyśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś176
16.5.11.2.Modelzaufaniaskoncentrowanynaużytkownikuśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś177
16.5.12.Przepisyprawne.............................................................179
16.6.Zaawansowanemetodyuwierzytelnianiaużytkownika...................................183
17.SystemybezpieczeństwapocztyPGP.............................187
17.1.HistoriaPGP.....................................................................187
17.1.1.GnuPrivacyGuardGPG......................................................189
17.2.DziałanieibezpieczeństwoPGP.....................................................189
17.3.NarzędziaumożliwiającepracęzPGPiGPG..........................................193
17.4.PrzekazywaniekluczynapotrzebyPGP...............................................195
17.5.ZaletywykorzystaniaPGPwochroniepocztyelektronicznej..............................196
18.Matematycznepodstawyinformatykikwantowej.................197
18.1.Wprowadzenie...................................................................197
18.2.Qubity..........................................................................200
18.2.1.NotacjaDiraca...............................................................200
18.2.2.Qubitywzapisiewektorowym..................................................204
18.2.3.Macierzegęstości............................................................210
18.2.4.Stanykwantowesplątane......................................................214
18.2.4.1.Obserwableśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś216
18.3.Bramkikwantowe................................................................218
18.3.1.Bramki1-qubitowe...........................................................218
18.3.2.Bramki2-qubitowe...........................................................223
18.3.3.Bramkin-qubitowe...........................................................226
18.4.Perspektywicznyuniwersalnykomputerkwantowy.....................................232
18.5.Algorytmykwantowe..............................................................233
18.5.1.AlgorytmposzukiwańGrovera.................................................234
18.5.2.AlgorytmfaktoryzacjiShora...................................................240
18.5.3.KwantowatransformacjaFouriera...............................................242
19.Kryptografakwantowa.....................................247
19.1.Wprowadzenie...................................................................247
19.2.Protokołykwantowe...............................................................248
19.2.1.ProtokółBB84...............................................................250
19.2.2.ProtokółB92................................................................252
19.2.3.Protokółteleportacjikwantowej.................................................252
19.2.3.1.StanyBellaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś254
9