Prepare for Quantum Break! Post-Quantum Crypto Deep Dive (PQC)
Descript Link: https://get.descript.com/968yizg2t4r3 🚀 Quantum computers are coming, and they could break today's encryption! This deep dive unpacks Post-Q...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in India under the topic 'crypto exchange binance'.
About this video
Descript Link: https://get.descript.com/968yizg2t4r3
🚀 Quantum computers are coming, and they could break today's encryption! This deep dive unpacks Post-Quantum Cryptography (PQC) - the essential upgrade needed to secure our digital world against the quantum threat. Learn why the transition is urgent and what NIST is doing about it.
In this episode, you'll learn:
⚛️ The Quantum Threat: Understand how Shor's algorithm targets RSA/ECC & the urgent "Harvest Now, Decrypt Later" risk posed by future quantum computers (CRQCs).
NIST's Standardization Race: Explore the multi-year process to find quantum-resistant algorithms, focusing on Lattice (Kyber, Dilithium), Hash (SPHINCS+), and Code-based cryptography.
✅ New Crypto Standards: Learn about the first finalized PQC standards (ML-KEM/Kyber, ML-DSA/Dilithium, SLH-DSA/SPHINCS+) and upcoming ones like Falcon & HQC.
⚙️ Huge Migration Challenges: Unpack the hurdles of transitioning: performance impacts, integration complexity, hybrid deployment strategies & the need for crypto agility.
⏳ Why Action is Needed NOW: Understand the implications of government mandates (US E.O. 14144) and the long lead times required for securing long-term data.
We break down the process of:
How NIST selected and standardized the first PQC algorithms.
The different mathematical foundations (lattices, hashes, codes) providing quantum resistance.
Strategies for migrating systems (hybrid modes, crypto agility).
Compare the vulnerabilities of current public-key crypto with the security goals of PQC. Understand why symmetric crypto (AES) is less vulnerable.
Gain special insights into:
🔥 The shrinking timelines for cryptographically relevant quantum computers (CRQCs).
📉 The "Harvest Now, Decrypt Later" attack scenario and its impact.
💡 The importance of diversifying PQC approaches (lattices, hashes, codes).
ভেঙে The lessons learned from the break of SIKE (isogeny-based crypto).
🛡️ The crucial role of ongoing research and cryptanalysis.
Subscribe for more deep dives into critical future technologies! 👍 Like this video if you understand the PQC urgency, and comment below: What's the biggest PQC migration challenge for organizations?
TIMESTAMPS:
00:00 Introduction to Quantum Resistant Cryptography
00:37 Understanding the Quantum Threat
03:08 Government Actions and Timelines
04:51 NIST's Role in Standardizing PQC
07:01 Diverse Approaches to PQC
12:56 Challenges in Implementing PQC
16:10 Key Takeaways and Call to Action
17:15 Conclusion and Further Resources
TOOLS MENTIONED:
(Algorithms/Standards mentioned, not software tools)
ML-KEM (formerly Kyber) - FIPS 203
ML-DSA (formerly Dilithium) - FIPS 204
SLH-DSA (SPHINCS+) - FIPS 205
Falcon (FN-DSA) - Upcoming Standard
HQC - Upcoming Standard
Classic McEliece - PQC Candidate
NTRU - Lattice Scheme
SIKE - Broken Isogeny Scheme
CONTACT INFORMATION:
🌐 Website: ianochiengai.substack.com
📺 YouTube: Ian Ochieng AI
🐦 Twitter: @IanOchiengAI
📸 Instagram: @IanOchiengAI
Video Information
Views
66
Total views since publication
Likes
3
User likes and reactions
Duration
18:18
Video length
Published
Jun 5, 2025
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
##PQC ##PostQuantumCryptography ##QuantumComputing ##Cryptography ##NIST ##Cybersecurity ##QuantumThreat ##Encryption ##AISecurity ##FutureProof
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.