YoVDO

Cybersecurity in the Post-Quantum Era - Challenges and Solutions

Offered By: DevConf via YouTube

Tags

Post-Quantum Cryptography Courses Cybersecurity Courses Quantum Computing Courses RSA Conference Courses ECDSA Courses TLS Courses SSH Courses IPsec Courses Lattice-Based Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implications of quantum computing on cybersecurity in this DevConf.CZ 2023 conference talk. Gain insights into post-quantum cryptography, understand how quantum computers threaten current security protocols, and learn about recommended quantum-resistant cryptography protocols from security authorities. Discover the timeline for transitioning away from existing asymmetric schemes, explore new methods for key establishment, data encryption, and digital signatures post-2025, and assess the readiness of current security libraries for the post-quantum era. Delve into topics such as lattice-based cryptography, code-based crypto, and hash-based crypto, while examining the challenges, motivations, and proposed solutions for maintaining cybersecurity in a world of advancing quantum technology.

Syllabus

Introduction
About the project
Challenges
Motivation
DWave
Quantum Computing
Short Algorithm
Gruber argonitum
Quantum Cryptography
Post Quantum Cryptography
Lattice Based Cryptography
Post Quantum Crypto
Codebased Crypto
Hashbased Crypto
Comparison
Post Quantum Standardization
Size of keys
What should be done
Timeline
Protocols
TLS
SSH
Certificates
Proposal
Conclusion
Questions


Taught by

DevConf

Related Courses

Intro to Computer Science
University of Virginia via Udacity
Quantum Mechanics for IT/NT/BT
Korea University via Open Education by Blackboard
Emergent Phenomena in Science and Everyday Life
University of California, Irvine via Coursera
Quantum Information and Computing
Indian Institute of Technology Bombay via Swayam
Quantum Computing
Indian Institute of Technology Kanpur via Swayam