Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the post-quantum future and separate quantum hype from actual developments in Europe in this keynote address. Delve into potential infosec challenges and opportunities brought by quantum computers and a quantum internet. Gain insights into various areas of quantum technologies and their relevance for security professionals. Learn about quantum supremacy, the need for quantum computers, qubits, entanglement, and different types of quantum computers. Understand prime numbers, mathematical problems, and the timeline for quantum computing advancements. Discover the importance of symmetric encryption and the implementation of new standards. Examine Quantum Key Distribution (QKD), its applications in site-to-site communication and internet backbones, as well as free-space QKD and QKD missions. Explore QKD criticality, standards, and KPN's role in quantum technologies. Conclude with final thoughts on the post-quantum landscape and its implications for information security.
Syllabus
Introduction
Agenda
Quantum supremacy
Why we need a quantum computer
What is a qubit
Entanglement
Fragility and No Cloning
Different Types of Quantum Computers
Prime Numbers
Math Problems
When
How long
Why symmetric
Implementing new standards
Phase plan of approach
QKD
Quantum Key Distribution
SitetoSite
Internet backbone
Freespace QKD
QKD Missions
QKD Critical
Standards
KPN
Final Thoughts
Taught by
NDC Conferences