Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore quantum hardening in cryptographic protocols through this 51-minute conference talk. Gain insights into the potential impact of practical quantum computers on existing cryptographic systems and learn when to start addressing these concerns. Delve into the design of modern cryptographic protocols, with an option to skip to the quantum hardening section at the 29-minute mark. Cover topics such as ancient cryptography, block ciphers, authentication tags, key derivation, asymmetric cryptography, Diffie-Hellman key exchange, Grover's and Shor's algorithms, current quantum computer capabilities, key encapsulation, digital signatures, robust combiners, and implementations of symmetric cryptography. Access additional resources, including blog posts and a German version of the talk, to further enhance your understanding of quantum hardening in cryptography.
Syllabus
Introduction
What is Cryptography
Ancient Cryptography
Caveat
Block Cipher
Authentication Tag
Key Derivation
Asymmetric Cryptography
DiffieHellman Key Exchange
DiffieHellman Protocol
Grovers Algorithm
Shor Algorithm
Quantum Computers Today
Key Encapsulation
Digital Signatures
Robust Combiners
Concatenation
Which Primitives
Implementations
Symmetric Cryptography
Questions
Taught by
media.ccc.de