How to Explain Post-Quantum Cryptography to a Middle School Student
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the world of post-quantum cryptography in this engaging 54-minute conference talk from 44CON Information Security Conference. Discover how to explain complex cryptographic concepts to middle school students using everyday objects and simple analogies. Learn about five families of post-quantum crypto systems, including lattice-based, code-based, non-commutative, multivariate, and hash-based signatures. Gain insights into the basics of quantum computing and its potential impact on current encryption methods. Understand the importance of developing quantum-resistant algorithms and follow the progress of the NIST Post-Quantum Crypto Competition. Through cartoons, drawings, photographs, and even a Rubik's Cube, grasp the fundamentals of advanced mathematical concepts in a way that's accessible to non-mathematicians.
Syllabus
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh at 44CON 2018
Taught by
44CON Information Security Conference
Related Courses
Lattices, Post-Quantum Security and Homomorphic EncryptionSimons Institute via YouTube The Learning With Errors Problem and Cryptographic Applications
Simons Institute via YouTube Fault Attacks on CCA-Secure Lattice KEMs
TheIACR via YouTube Lattice-Based Cryptography
TheIACR via YouTube Lattice-Based Cryptography
TheIACR via YouTube