Richard Tychansky - Post-Quantum Computing & Cryptographic Algorithm Standardization (11/15/2023)

Abstract: You are now exiting the “Twilight Zone”. Access to Quantum Processing Units (QPUs) and native algorithms written in Qiskit are now a reality and it...

NC State Computer Science142 views01:02:01

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

Abstract: You are now exiting the “Twilight Zone”. Access to Quantum Processing Units (QPUs) and native algorithms written in Qiskit are now a reality and it will soon put Internet commerce at risk for decryption. Running Shor’s algorithm to factor RSA is as easy as running native code on a quantum computing provider’s platform. This is the brave new world where RSA and Diffie-Hellman will no longer be trusted for Internet commerce. In this session we will examine the NIST candidate algorithms for public-key encryption, key-establishment algorithms and digital signatures. We will build an understanding of how each of the algorithms work and their susceptibility to different forms of cryptanalysis. Find out which algorithm is most resistant to cryptanalysis and how to prepare for the drive to strategically modernization cryptographic infrastructures.

Video Information

Views
142

Total views since publication

Likes
2

User likes and reactions

Duration
01:02:01

Video length

Published
Nov 20, 2023

Release date

Quality
hd

Video definition