Главная
Study mode:
on
1
Introduction
2
About the project
3
Challenges
4
Motivation
5
DWave
6
Quantum Computing
7
Short Algorithm
8
Gruber argonitum
9
Quantum Cryptography
10
Post Quantum Cryptography
11
Lattice Based Cryptography
12
Post Quantum Crypto
13
Codebased Crypto
14
Hashbased Crypto
15
Comparison
16
Post Quantum Standardization
17
Size of keys
18
What should be done
19
Timeline
20
Protocols
21
TLS
22
SSH
23
Certificates
24
Proposal
25
Conclusion
26
Questions
Description:
Explore the implications of quantum computing on cybersecurity in this DevConf.CZ 2023 conference talk. Gain insights into post-quantum cryptography, understand how quantum computers threaten current security protocols, and learn about recommended quantum-resistant cryptography protocols from security authorities. Discover the timeline for transitioning away from existing asymmetric schemes, explore new methods for key establishment, data encryption, and digital signatures post-2025, and assess the readiness of current security libraries for the post-quantum era. Delve into topics such as lattice-based cryptography, code-based crypto, and hash-based crypto, while examining the challenges, motivations, and proposed solutions for maintaining cybersecurity in a world of advancing quantum technology.

Cybersecurity in the Post-Quantum Era - Challenges and Solutions

DevConf
Add to list
0:00 / 0:00