YoVDO

Quantum Hardening Cryptographic Protocols - DiVOC - 2020

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Quantum Computing Courses Grover's Algorithm Courses Shor's Algorithm Courses

Course Description

Overview

Explore quantum hardening in cryptographic protocols through this 51-minute conference talk. Gain insights into the potential impact of practical quantum computers on existing cryptographic systems and learn when to start addressing these concerns. Delve into the design of modern cryptographic protocols, with an option to skip to the quantum hardening section at the 29-minute mark. Cover topics such as ancient cryptography, block ciphers, authentication tags, key derivation, asymmetric cryptography, Diffie-Hellman key exchange, Grover's and Shor's algorithms, current quantum computer capabilities, key encapsulation, digital signatures, robust combiners, and implementations of symmetric cryptography. Access additional resources, including blog posts and a German version of the talk, to further enhance your understanding of quantum hardening in cryptography.

Syllabus

Introduction
What is Cryptography
Ancient Cryptography
Caveat
Block Cipher
Authentication Tag
Key Derivation
Asymmetric Cryptography
DiffieHellman Key Exchange
DiffieHellman Protocol
Grovers Algorithm
Shor Algorithm
Quantum Computers Today
Key Encapsulation
Digital Signatures
Robust Combiners
Concatenation
Which Primitives
Implementations
Symmetric Cryptography
Questions


Taught by

media.ccc.de

Related Courses

Understanding Quantum Computers
Keio University via FutureLearn
Квантовые вычисления (Quantum computing)
Saint Petersburg State University via Coursera
Quantum Information Science I, Part 2
Massachusetts Institute of Technology via edX
The Introduction to Quantum Computing
Saint Petersburg State University via Coursera
Quantum Computing
NPTEL via YouTube