Overview
Explore the impact of quantum computing on cryptography in this 40-minute talk by Carlos Cid from Simula UiB and Okinawa Institute of Science and Technology. Delve into the world of post-quantum cryptographic algorithms and their importance in maintaining security in the face of advancing quantum technologies. Learn about the ongoing NIST standardization process for selecting post-quantum encryption and signature schemes. Gain insights into traditional cryptography applications, symmetric encryption, key establishment protocols, and modern secure communication methods. Understand quantum security concepts, including Grover's algorithm and the challenges of building quantum computers. Examine post-quantum cryptography, focusing on mathematical problems, lattice-based cryptography, and code-based cryptography security. Discover the latest developments in the post-quantum standardization process, including the breaking of the Rainbow algorithm and the current state of the fourth round. Conclude with a Q&A session to address any remaining questions on this crucial topic in the evolving landscape of cryptographic research and real-world implementation.
Syllabus
Introduction
What is Cryptography
Traditional Use of Cryptography
Applications of Cryptography
Symmetric Encryption
Key established protocols
Modern secure communication
Quantum security
Quantum computers
Grovers algorithm
Building quantum computers
Cryptulator attack mode
Postquant cryptography
Mathematical problems
Latticebased cryptography
Security of codebased cryptography
Postquantum standardization process
Breaking Rainbow
Fourth Round
Questions
Taught by
Gemini Center on Quantum Computing