Richard Tychansky on Post-Quantum Cryptography & Future Standards โ๏ธ
Explore the latest developments in post-quantum computing and cryptographic algorithm standardization with Richard Tychansky. Discover how QPUs and quantum algorithms are shaping the future of cybersecurity.

NC State Computer Science
142 views โข Nov 20, 2023

About this video
Abstract: You are now exiting the โTwilight Zoneโ. Access to Quantum Processing Units (QPUs) and native algorithms written in Qiskit are now a reality and it will soon put Internet commerce at risk for
decryption. Running Shorโs algorithm to factor RSA is as easy as running native code on a quantum computing providerโs platform. This is the brave new world where RSA and Diffie-Hellman will no longer be trusted for Internet commerce. In this session we will examine the NIST candidate
algorithms for public-key encryption, key-establishment algorithms and digital signatures. We will build an understanding of how each of the algorithms work and their susceptibility to different forms of cryptanalysis. Find out which algorithm is most resistant to cryptanalysis and how to prepare for the drive to strategically modernization cryptographic infrastructures.
decryption. Running Shorโs algorithm to factor RSA is as easy as running native code on a quantum computing providerโs platform. This is the brave new world where RSA and Diffie-Hellman will no longer be trusted for Internet commerce. In this session we will examine the NIST candidate
algorithms for public-key encryption, key-establishment algorithms and digital signatures. We will build an understanding of how each of the algorithms work and their susceptibility to different forms of cryptanalysis. Find out which algorithm is most resistant to cryptanalysis and how to prepare for the drive to strategically modernization cryptographic infrastructures.
Video Information
Views
142
Likes
2
Duration
01:02:01
Published
Nov 20, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.