Post Quantum Future
Offered By: NDC Conferences via YouTube
Course Description
Overview
Explore the post-quantum future and separate quantum hype from actual developments in Europe in this keynote address. Delve into potential infosec challenges and opportunities brought by quantum computers and a quantum internet. Gain insights into various areas of quantum technologies and their relevance for security professionals. Learn about quantum supremacy, the need for quantum computers, qubits, entanglement, and different types of quantum computers. Understand prime numbers, mathematical problems, and the timeline for quantum computing advancements. Discover the importance of symmetric encryption and the implementation of new standards. Examine Quantum Key Distribution (QKD), its applications in site-to-site communication and internet backbones, as well as free-space QKD and QKD missions. Explore QKD criticality, standards, and KPN's role in quantum technologies. Conclude with final thoughts on the post-quantum landscape and its implications for information security.
Syllabus
Introduction
Agenda
Quantum supremacy
Why we need a quantum computer
What is a qubit
Entanglement
Fragility and No Cloning
Different Types of Quantum Computers
Prime Numbers
Math Problems
When
How long
Why symmetric
Implementing new standards
Phase plan of approach
QKD
Quantum Key Distribution
SitetoSite
Internet backbone
Freespace QKD
QKD Missions
QKD Critical
Standards
KPN
Final Thoughts
Taught by
NDC Conferences
Related Courses
Quantum Information Science II: Efficient Quantum Computing - fault tolerance and complexityMassachusetts Institute of Technology via edX Quantum Supremacy - Benchmarking the Sycamore Processor
TensorFlow via YouTube The Problem with Qubits
Simons Institute via YouTube Quantum Supremacy via Boson Sampling: Theory and Practice - Quantum Colloquium
Simons Institute via YouTube The Power of Random Quantum Circuits
Simons Institute via YouTube