Richard Tychansky - Post-Quantum Computing & Cryptographic Algorithm Standardization (11/15/2023)
Abstract: You are now exiting the “Twilight Zone”. Access to Quantum Processing Units (QPUs) and native algorithms written in Qiskit are now a reality and it...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Abstract: You are now exiting the “Twilight Zone”. Access to Quantum Processing Units (QPUs) and native algorithms written in Qiskit are now a reality and it will soon put Internet commerce at risk for
decryption. Running Shor’s algorithm to factor RSA is as easy as running native code on a quantum computing provider’s platform. This is the brave new world where RSA and Diffie-Hellman will no longer be trusted for Internet commerce. In this session we will examine the NIST candidate
algorithms for public-key encryption, key-establishment algorithms and digital signatures. We will build an understanding of how each of the algorithms work and their susceptibility to different forms of cryptanalysis. Find out which algorithm is most resistant to cryptanalysis and how to prepare for the drive to strategically modernization cryptographic infrastructures.
Video Information
Views
142
Total views since publication
Likes
2
User likes and reactions
Duration
01:02:01
Video length
Published
Nov 20, 2023
Release date
Quality
hd
Video definition