YoVDO

Quantum Resistance through Symmetric Key Cryptography

Offered By: PKI Consortium via YouTube

Tags

Post-Quantum Cryptography Courses Cryptography Courses Quantum Computing Courses Asymmetric Encryption Courses Data Protection Courses Symmetric Key Cryptography Courses PKI Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how symmetric encryption algorithms can be used to protect data against quantum computer attacks in this 29-minute presentation by Pasqualle Verwoerdt, Board of Directors at Compumatica. Learn about the often-overlooked fact that symmetric encryption algorithms like AES256 are already considered post-quantum secure. Discover techniques for using symmetric encryption to protect existing asymmetric implementations, ensuring data security even if quantum computers become powerful enough to break asymmetric encryption algorithms. Gain valuable insights into the future of cryptography and how to prepare for the quantum computing era.

Syllabus

Quantum Resistance through Symmetric Key Cryptography


Taught by

PKI Consortium

Related Courses

Information Security - Authentication and Access Control
New York University (NYU) via edX
Cryptography from Scratch| Master Cryptography in Java
Udemy
Ethical Hacking: Cryptography
LinkedIn Learning
Securing Data with Asymmetric Cryptography
Pluralsight
Windows Server Network Infrastructure
Microsoft via Microsoft Learn