Главная
Study mode:
on
1
Introduction
2
What is Cryptography
3
Ancient Cryptography
4
Caveat
5
Block Cipher
6
Authentication Tag
7
Key Derivation
8
Asymmetric Cryptography
9
DiffieHellman Key Exchange
10
DiffieHellman Protocol
11
Grovers Algorithm
12
Shor Algorithm
13
Quantum Computers Today
14
Key Encapsulation
15
Digital Signatures
16
Robust Combiners
17
Concatenation
18
Which Primitives
19
Implementations
20
Symmetric Cryptography
21
Questions
Description:
Explore quantum hardening in cryptographic protocols through this 51-minute conference talk. Gain insights into the potential impact of practical quantum computers on existing cryptographic systems and learn when to start addressing these concerns. Delve into the design of modern cryptographic protocols, with an option to skip to the quantum hardening section at the 29-minute mark. Cover topics such as ancient cryptography, block ciphers, authentication tags, key derivation, asymmetric cryptography, Diffie-Hellman key exchange, Grover's and Shor's algorithms, current quantum computer capabilities, key encapsulation, digital signatures, robust combiners, and implementations of symmetric cryptography. Access additional resources, including blog posts and a German version of the talk, to further enhance your understanding of quantum hardening in cryptography.

Quantum Hardening Cryptographic Protocols - DiVOC - 2020

media.ccc.de
Add to list