Kyber: Post-Quantum Cryptography Explained
In this group presentation, we explore CRYSTALS-Kyber (standardized by NIST as ML-KEM), a cutting-edge post-quantum cryptographic algorithm designed to resis...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.
About this video
In this group presentation, we explore CRYSTALS-Kyber (standardized by NIST as ML-KEM), a cutting-edge post-quantum cryptographic algorithm designed to resist quantum attacks.
🔍 We begin with an introduction to quantum computing and the growing need for post-quantum cryptography, especially as quantum advancements threaten traditional encryption methods like RSA and ECC through algorithms like Shor’s Algorithm.
The presentation covers:
🧠 How Kyber works using lattice-based cryptography and Module Learning With Errors (MLWE)
💻 A practical live demo comparing Kyber’s performance with RSA
🌐 Real-world use cases and adoption in browsers, government, and tech platforms
📐 The mathematics behind Kyber, including polynomial operations and encryption/decryption with noise
🎓 Whether you're a cybersecurity student, cryptography enthusiast, or tech professional, this session will help you understand why Kyber is the leading choice for securing data in a post-quantum world.
📘 This presentation was submitted as part of the Master of Information and Cybersecurity (MICS) program at UC Berkeley.
Video Information
Views
375
Total views since publication
Likes
16
User likes and reactions
Duration
30:02
Video length
Published
Jun 29, 2025
Release date
Quality
hd
Video definition