Bill, a Ph.D. holder in cryptography, shared his experience working in the security industry and his current role as a principal product manager for a secure collaboration platform for critical infrastructure. He mentioned that their platform, Matter Most, is used by the Air Force's Air Mobility Command and other organizations for their flight operations. Bill also talked about the importance of security and how he got involved with the company. Rick,
a Ph.D. candidate in cyber security leadership, expressed his interest in learning more about cryptography and Bill's journey in pursuing this field.
Bill discussed the history of cryptography, starting with Julius Caesar's Caesar Cipher, which was a simple letter substitution method. He then moved on to more complex systems like the German Enigma Cipher, which used a polyalphabetic substitution cipher and electromechanical systems. Bill explained that these systems were so complex that they were difficult for humans to break. He also mentioned the development of computers
to decrypt these ciphers, which led to the modern computing revolution. Finally, he touched on the use of private key ciphers, where both parties needed to know the same key to decode messages.
Bill discussed the evolution of internet security, focusing on the invention of public key cryptography. He explained how this technology allows for secure communication and digital signatures, which are crucial for e-commerce. He also touched on the Transport Layer Security (TLS) protocol, which enables secure connections between servers and clients. Bill emphasized that this foundation of cryptography has been the basis of the modern internet, enabling secure transactions and communication.
Bill discussed the limitations of current cryptography algorithms, particularly RSA, in the face of quantum computers. He explained that RSA is based on the difficulty of factoring large composite numbers, but quantum computers could potentially break this. However, he clarified that the recent Chinese claim of breaking RSA encryption was exaggerated, as they only managed to factor a 50-bit composite, which is easily done with a conventional computer. Bill emphasized that the real concern is the future development of quantum computers, which will eventually be able to factor larger composites, necessitating a change in the way cryptography is done.
Bill discussed the potential threat of quantum computers to security, noting that adversaries are already recording sensitive communications for future decryption. He emphasized the need for foresightful planning to protect against this risk. Bill also expressed optimism about the use of AI to detect and prevent social engineering attacks, which often exploit human weaknesses. Rick then asked Bill about recent evolutions in the cybersecurity landscape that he found exciting, and Bill responded by highlighting the potential of AI to bolster education and technology in detecting and preventing social engineering attacks.
Bill emphasized the importance of using standardized algorithms from reputable companies, particularly open-source ones, to ensure robust cybersecurity. He stressed the need for multiple layers of security and not relying on a single system. Bill also highlighted the importance of understanding one's threat model and being pragmatic about what can be protected against. He advised against trying to create new cryptography algorithms without public scrutiny and recommended using existing, well-
reviewed systems. Lastly, Bill discussed the upcoming NIST post-quantum cryptography standard and the need for businesses to start planning for the potential impact of quantum computing on their security.
Connect with Bill: https://www.linkedin.com/in/billranderson/
Visit Mattermost: https://mattermost.com/
Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1
Visit our website: https://www.shortarmsolutions.com/
Find our content at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
#cybersecurity #quantum #quantumcomputing #cryptography #cyber #infosec #informationsecurity #podcast #IT #informationtechnology #technology #shortarmsolutions
00:00 Introduction
03:28 What is Cryptography
12:27 RSA Encryption Broken?
18:37 Cybersecurity Evolutions
20:13 Common Misconceptions
22:10 Robust Cyber Strategy
25:08 NIST Quantum Standard
26:53 Quantum Safety
27:45 Top Actions
28:51 Sign Off