Demystifying the quantum crypto threat

Attack Detect Defend
Attack Detect Defend
778 بار بازدید - پارسال - Welcome to the first in
Welcome to the first in a series of videos on post quantum cryptography, where we start with a view on the real risk that quantum computing poses today, and an overview of what we as cyber security professionals can do to overcome those risks. We touch on the pros and cons of quantum random number generation, quantum key exchange, and quantum-resistant algorithms selected for standardisation by NIST.

References:
NIST’s Post-Quantum Crypto Homepage: https://csrc.nist.gov/projects/post-q...
NCSC’s Quantum-Safe Cryptography Whitepaper: https://www.ncsc.gov.uk/whitepaper/pr...

Timecodes:
0:00 Intro
0:49 Quantum Physics
1:16 Quantum Computing
2:12 Cracking Crypto with Quantum Computers
4:39 Quantum Cryptography
5:17 Quantum Random Number Generation
7:14 Quantum Key Exchange
8:37 Quantum-Resistant Cryptography
11:39 Round-up

Credits:
Intro/Outro Music: Render - Prism: Render - Prism [Creative Commons] (via Argofox: argofox)
Diagram icons designed by OpenMoji (https://openmoji.org/) CC BY-SA 4.0
پارسال در تاریخ 1402/03/11 منتشر شده است.
778 بـار بازدید شده
... بیشتر