Kyber: Post-Quantum Cryptography Explained

In this group presentation, we explore CRYSTALS-Kyber (standardized by NIST as ML-KEM), a cutting-edge post-quantum cryptographic algorithm designed to resis...

Anna375 views30:02

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.

About this video

In this group presentation, we explore CRYSTALS-Kyber (standardized by NIST as ML-KEM), a cutting-edge post-quantum cryptographic algorithm designed to resist quantum attacks. 🔍 We begin with an introduction to quantum computing and the growing need for post-quantum cryptography, especially as quantum advancements threaten traditional encryption methods like RSA and ECC through algorithms like Shor’s Algorithm. The presentation covers: 🧠 How Kyber works using lattice-based cryptography and Module Learning With Errors (MLWE) 💻 A practical live demo comparing Kyber’s performance with RSA 🌐 Real-world use cases and adoption in browsers, government, and tech platforms 📐 The mathematics behind Kyber, including polynomial operations and encryption/decryption with noise 🎓 Whether you're a cybersecurity student, cryptography enthusiast, or tech professional, this session will help you understand why Kyber is the leading choice for securing data in a post-quantum world. 📘 This presentation was submitted as part of the Master of Information and Cybersecurity (MICS) program at UC Berkeley.

Video Information

Views
375

Total views since publication

Likes
16

User likes and reactions

Duration
30:02

Video length

Published
Jun 29, 2025

Release date

Quality
hd

Video definition

About the Channel