HITCON 2020 Post-Quantum Cryptography

Cryptography is rarely the weakest link in a system. Adi Shamir famously said "Cryptography is typically bypassed, not penetrated." However, current developm...

HITCONโ€ข804 viewsโ€ข53:31

๐Ÿ”ฅ Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Turkey under the topic 'bursa deprem'.

About this video

Cryptography is rarely the weakest link in a system. Adi Shamir famously said "Cryptography is typically bypassed, not penetrated." However, current developments in physics are set to change this.Quantum computers with several million stable qubits can break all currently deployed public-key cryptography using an algorithm due to Peter Shor. Systems basing their security on RSA, Diffie-Hellman, or elliptic-curve cryptography will no longer be secure. Worse, data sent today and recorded by an attacker can be decrypted by the attacker once they get a large quantum computer. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer. Cryptosystems are studied for security under this attack model. The good news is that some systems remain secure. The bad news is that those are not (yet) commonly available. This talk will explain the threat that quantum computers pose to security and show some systems that can stand up to such attacks. The talk will also cover an ongoing competition by the US National Institute of Standards and Technology (NIST) to standardize post-quantum systems.

Video Information

Views
804

Total views since publication

Likes
15

User likes and reactions

Duration
53:31

Video length

Published
Dec 8, 2020

Release date

Quality
hd

Video definition