YoVDO

Quantum Resistance through Symmetric Key Cryptography

Offered By: PKI Consortium via YouTube

Tags

Post-Quantum Cryptography Courses Cryptography Courses Quantum Computing Courses Asymmetric Encryption Courses Data Protection Courses Symmetric Key Cryptography Courses PKI Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how symmetric encryption algorithms can be used to protect data against quantum computer attacks in this 29-minute presentation by Pasqualle Verwoerdt, Board of Directors at Compumatica. Learn about the often-overlooked fact that symmetric encryption algorithms like AES256 are already considered post-quantum secure. Discover techniques for using symmetric encryption to protect existing asymmetric implementations, ensuring data security even if quantum computers become powerful enough to break asymmetric encryption algorithms. Gain valuable insights into the future of cryptography and how to prepare for the quantum computing era.

Syllabus

Quantum Resistance through Symmetric Key Cryptography


Taught by

PKI Consortium

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera