Quantum Hardening Cryptographic Protocols - DiVOC - 2020
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore quantum hardening in cryptographic protocols through this 51-minute conference talk. Gain insights into the potential impact of practical quantum computers on existing cryptographic systems and learn when to start addressing these concerns. Delve into the design of modern cryptographic protocols, with an option to skip to the quantum hardening section at the 29-minute mark. Cover topics such as ancient cryptography, block ciphers, authentication tags, key derivation, asymmetric cryptography, Diffie-Hellman key exchange, Grover's and Shor's algorithms, current quantum computer capabilities, key encapsulation, digital signatures, robust combiners, and implementations of symmetric cryptography. Access additional resources, including blog posts and a German version of the talk, to further enhance your understanding of quantum hardening in cryptography.
Syllabus
Introduction
What is Cryptography
Ancient Cryptography
Caveat
Block Cipher
Authentication Tag
Key Derivation
Asymmetric Cryptography
DiffieHellman Key Exchange
DiffieHellman Protocol
Grovers Algorithm
Shor Algorithm
Quantum Computers Today
Key Encapsulation
Digital Signatures
Robust Combiners
Concatenation
Which Primitives
Implementations
Symmetric Cryptography
Questions
Taught by
media.ccc.de
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network