YoVDO

Cybersecurity in the Post-Quantum Era - Challenges and Solutions

Offered By: DevConf via YouTube

Tags

Post-Quantum Cryptography Courses Cybersecurity Courses Quantum Computing Courses RSA Conference Courses ECDSA Courses TLS Courses SSH Courses IPsec Courses Lattice-Based Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implications of quantum computing on cybersecurity in this DevConf.CZ 2023 conference talk. Gain insights into post-quantum cryptography, understand how quantum computers threaten current security protocols, and learn about recommended quantum-resistant cryptography protocols from security authorities. Discover the timeline for transitioning away from existing asymmetric schemes, explore new methods for key establishment, data encryption, and digital signatures post-2025, and assess the readiness of current security libraries for the post-quantum era. Delve into topics such as lattice-based cryptography, code-based crypto, and hash-based crypto, while examining the challenges, motivations, and proposed solutions for maintaining cybersecurity in a world of advancing quantum technology.

Syllabus

Introduction
About the project
Challenges
Motivation
DWave
Quantum Computing
Short Algorithm
Gruber argonitum
Quantum Cryptography
Post Quantum Cryptography
Lattice Based Cryptography
Post Quantum Crypto
Codebased Crypto
Hashbased Crypto
Comparison
Post Quantum Standardization
Size of keys
What should be done
Timeline
Protocols
TLS
SSH
Certificates
Proposal
Conclusion
Questions


Taught by

DevConf

Related Courses

Microsoft Azure Solutions Architect: Implement a Virtual Networking Strategy
Pluralsight
Cisco Network Security: VPN
LinkedIn Learning
Virtual Private Networks for beginners - VPN, Cisco training
Udemy
Cisco Enterprise Networks: Troubleshooting BGP and GRE Tunnels
Pluralsight
Windows 10 Configuring (70-697): Configure Networking
Pluralsight