Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implications of quantum computing on cybersecurity in this DevConf.CZ 2023 conference talk. Gain insights into post-quantum cryptography, understand how quantum computers threaten current security protocols, and learn about recommended quantum-resistant cryptography protocols from security authorities. Discover the timeline for transitioning away from existing asymmetric schemes, explore new methods for key establishment, data encryption, and digital signatures post-2025, and assess the readiness of current security libraries for the post-quantum era. Delve into topics such as lattice-based cryptography, code-based crypto, and hash-based crypto, while examining the challenges, motivations, and proposed solutions for maintaining cybersecurity in a world of advancing quantum technology.
Syllabus
Introduction
About the project
Challenges
Motivation
DWave
Quantum Computing
Short Algorithm
Gruber argonitum
Quantum Cryptography
Post Quantum Cryptography
Lattice Based Cryptography
Post Quantum Crypto
Codebased Crypto
Hashbased Crypto
Comparison
Post Quantum Standardization
Size of keys
What should be done
Timeline
Protocols
TLS
SSH
Certificates
Proposal
Conclusion
Questions
Taught by
DevConf