Quantum Hardening Cryptographic Protocols - DiVOC - 2020
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore quantum hardening in cryptographic protocols through this 51-minute conference talk. Gain insights into the potential impact of practical quantum computers on existing cryptographic systems and learn when to start addressing these concerns. Delve into the design of modern cryptographic protocols, with an option to skip to the quantum hardening section at the 29-minute mark. Cover topics such as ancient cryptography, block ciphers, authentication tags, key derivation, asymmetric cryptography, Diffie-Hellman key exchange, Grover's and Shor's algorithms, current quantum computer capabilities, key encapsulation, digital signatures, robust combiners, and implementations of symmetric cryptography. Access additional resources, including blog posts and a German version of the talk, to further enhance your understanding of quantum hardening in cryptography.
Syllabus
Introduction
What is Cryptography
Ancient Cryptography
Caveat
Block Cipher
Authentication Tag
Key Derivation
Asymmetric Cryptography
DiffieHellman Key Exchange
DiffieHellman Protocol
Grovers Algorithm
Shor Algorithm
Quantum Computers Today
Key Encapsulation
Digital Signatures
Robust Combiners
Concatenation
Which Primitives
Implementations
Symmetric Cryptography
Questions
Taught by
media.ccc.de
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube