Will Quantum Computing Break All Cybersecurity? | Dr Bill Anderson | CPP 344

Bill, a Ph.D. holder in cryptography, shared his experience working in the security industry and his current role as a principal product manager for a secure...

The Cyber Pro38 views29:00

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in United Kingdom under the topic 'hayley williams'.

About this video

Bill, a Ph.D. holder in cryptography, shared his experience working in the security industry and his current role as a principal product manager for a secure collaboration platform for critical infrastructure. He mentioned that their platform, Matter Most, is used by the Air Force's Air Mobility Command and other organizations for their flight operations. Bill also talked about the importance of security and how he got involved with the company. Rick, a Ph.D. candidate in cyber security leadership, expressed his interest in learning more about cryptography and Bill's journey in pursuing this field. Bill discussed the history of cryptography, starting with Julius Caesar's Caesar Cipher, which was a simple letter substitution method. He then moved on to more complex systems like the German Enigma Cipher, which used a polyalphabetic substitution cipher and electromechanical systems. Bill explained that these systems were so complex that they were difficult for humans to break. He also mentioned the development of computers to decrypt these ciphers, which led to the modern computing revolution. Finally, he touched on the use of private key ciphers, where both parties needed to know the same key to decode messages. Bill discussed the evolution of internet security, focusing on the invention of public key cryptography. He explained how this technology allows for secure communication and digital signatures, which are crucial for e-commerce. He also touched on the Transport Layer Security (TLS) protocol, which enables secure connections between servers and clients. Bill emphasized that this foundation of cryptography has been the basis of the modern internet, enabling secure transactions and communication. Bill discussed the limitations of current cryptography algorithms, particularly RSA, in the face of quantum computers. He explained that RSA is based on the difficulty of factoring large composite numbers, but quantum computers could potentially break this. However, he clarified that the recent Chinese claim of breaking RSA encryption was exaggerated, as they only managed to factor a 50-bit composite, which is easily done with a conventional computer. Bill emphasized that the real concern is the future development of quantum computers, which will eventually be able to factor larger composites, necessitating a change in the way cryptography is done. Bill discussed the potential threat of quantum computers to security, noting that adversaries are already recording sensitive communications for future decryption. He emphasized the need for foresightful planning to protect against this risk. Bill also expressed optimism about the use of AI to detect and prevent social engineering attacks, which often exploit human weaknesses. Rick then asked Bill about recent evolutions in the cybersecurity landscape that he found exciting, and Bill responded by highlighting the potential of AI to bolster education and technology in detecting and preventing social engineering attacks. Bill emphasized the importance of using standardized algorithms from reputable companies, particularly open-source ones, to ensure robust cybersecurity. He stressed the need for multiple layers of security and not relying on a single system. Bill also highlighted the importance of understanding one's threat model and being pragmatic about what can be protected against. He advised against trying to create new cryptography algorithms without public scrutiny and recommended using existing, well- reviewed systems. Lastly, Bill discussed the upcoming NIST post-quantum cryptography standard and the need for businesses to start planning for the potential impact of quantum computing on their security. Connect with Bill: https://www.linkedin.com/in/billranderson/ Visit Mattermost: https://mattermost.com/ Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1 Visit our website: https://www.shortarmsolutions.com/ Find our content at: Linked In: https://www.linkedin.com/company/shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS #cybersecurity #quantum #quantumcomputing #cryptography #cyber #infosec #informationsecurity #podcast #IT #informationtechnology #technology #shortarmsolutions 00:00 Introduction 03:28 What is Cryptography 12:27 RSA Encryption Broken? 18:37 Cybersecurity Evolutions 20:13 Common Misconceptions 22:10 Robust Cyber Strategy 25:08 NIST Quantum Standard 26:53 Quantum Safety 27:45 Top Actions 28:51 Sign Off

Video Information

Views
38

Total views since publication

Duration
29:00

Video length

Published
Apr 9, 2025

Release date

Quality
hd

Video definition