YoVDO

Quantum Resistance through Symmetric Key Cryptography

Offered By: PKI Consortium via YouTube

Tags

Post-Quantum Cryptography Courses Cryptography Courses Quantum Computing Courses Asymmetric Encryption Courses Data Protection Courses Symmetric Key Cryptography Courses PKI Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how symmetric encryption algorithms can be used to protect data against quantum computer attacks in this 29-minute presentation by Pasqualle Verwoerdt, Board of Directors at Compumatica. Learn about the often-overlooked fact that symmetric encryption algorithms like AES256 are already considered post-quantum secure. Discover techniques for using symmetric encryption to protect existing asymmetric implementations, ensuring data security even if quantum computers become powerful enough to break asymmetric encryption algorithms. Gain valuable insights into the future of cryptography and how to prepare for the quantum computing era.

Syllabus

Quantum Resistance through Symmetric Key Cryptography


Taught by

PKI Consortium

Related Courses

Security Engineering: Automation for CompTIA SecurityX
Pluralsight
On the Security of Proofs of Sequential Work in a Post-Quantum World
Paul G. Allen School via YouTube
Post-Quantum Isogeny Cryptography
media.ccc.de via YouTube
A Cartoon-Based Introduction to Post-Quantum Cryptography
Electronic Frontiers Forums at DragonCon via YouTube
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
IEEE via YouTube