Will Quantum Computing Break All Cybersecurity? | Dr Bill Anderson | CPP 344
Bill, a Ph.D. holder in cryptography, shared his experience working in the security industry and his current role as a principal product manager for a secure...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in United Kingdom under the topic 'hayley williams'.
About this video
Bill, a Ph.D. holder in cryptography, shared his experience working in the security industry and his current role as a principal product manager for a secure collaboration platform for critical infrastructure. He mentioned that their platform, Matter Most, is used by the Air Force's Air Mobility Command and other organizations for their flight operations. Bill also talked about the importance of security and how he got involved with the company. Rick,
a Ph.D. candidate in cyber security leadership, expressed his interest in learning more about cryptography and Bill's journey in pursuing this field.
Bill discussed the history of cryptography, starting with Julius Caesar's Caesar Cipher, which was a simple letter substitution method. He then moved on to more complex systems like the German Enigma Cipher, which used a polyalphabetic substitution cipher and electromechanical systems. Bill explained that these systems were so complex that they were difficult for humans to break. He also mentioned the development of computers
to decrypt these ciphers, which led to the modern computing revolution. Finally, he touched on the use of private key ciphers, where both parties needed to know the same key to decode messages.
Bill discussed the evolution of internet security, focusing on the invention of public key cryptography. He explained how this technology allows for secure communication and digital signatures, which are crucial for e-commerce. He also touched on the Transport Layer Security (TLS) protocol, which enables secure connections between servers and clients. Bill emphasized that this foundation of cryptography has been the basis of the modern internet, enabling secure transactions and communication.
Bill discussed the limitations of current cryptography algorithms, particularly RSA, in the face of quantum computers. He explained that RSA is based on the difficulty of factoring large composite numbers, but quantum computers could potentially break this. However, he clarified that the recent Chinese claim of breaking RSA encryption was exaggerated, as they only managed to factor a 50-bit composite, which is easily done with a conventional computer. Bill emphasized that the real concern is the future development of quantum computers, which will eventually be able to factor larger composites, necessitating a change in the way cryptography is done.
Bill discussed the potential threat of quantum computers to security, noting that adversaries are already recording sensitive communications for future decryption. He emphasized the need for foresightful planning to protect against this risk. Bill also expressed optimism about the use of AI to detect and prevent social engineering attacks, which often exploit human weaknesses. Rick then asked Bill about recent evolutions in the cybersecurity landscape that he found exciting, and Bill responded by highlighting the potential of AI to bolster education and technology in detecting and preventing social engineering attacks.
Bill emphasized the importance of using standardized algorithms from reputable companies, particularly open-source ones, to ensure robust cybersecurity. He stressed the need for multiple layers of security and not relying on a single system. Bill also highlighted the importance of understanding one's threat model and being pragmatic about what can be protected against. He advised against trying to create new cryptography algorithms without public scrutiny and recommended using existing, well-
reviewed systems. Lastly, Bill discussed the upcoming NIST post-quantum cryptography standard and the need for businesses to start planning for the potential impact of quantum computing on their security.
Connect with Bill: https://www.linkedin.com/in/billranderson/
Visit Mattermost: https://mattermost.com/
Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1
Visit our website: https://www.shortarmsolutions.com/
Find our content at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
#cybersecurity #quantum #quantumcomputing #cryptography #cyber #infosec #informationsecurity #podcast #IT #informationtechnology #technology #shortarmsolutions
00:00 Introduction
03:28 What is Cryptography
12:27 RSA Encryption Broken?
18:37 Cybersecurity Evolutions
20:13 Common Misconceptions
22:10 Robust Cyber Strategy
25:08 NIST Quantum Standard
26:53 Quantum Safety
27:45 Top Actions
28:51 Sign Off
Video Information
Views
38
Total views since publication
Duration
29:00
Video length
Published
Apr 9, 2025
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#network security #computer security #information security #IT #podcast #application security #mattermost #dr bill anderson #hackers #quantum #quantum computers #cryptography #data #data privacy #data breech #personal data #classified #classified data #private key ciphers #ciphers #quantum computing #AI #artificial intelligence #cybersecurity for beginners #cyber security #cybersecurity roadmap #infosec cyber security #data analyst #data scientist #data science #data engineer
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.