this post was submitted on 16 Nov 2023
2 points (100.0% liked)

Security CPE

368 readers
1 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 2 years ago
MODERATORS
 

Quantum and Post-Quantum Crypto by Les Bell

A high-level overview of quantum cryptology, covering basic quantum mechanics, quantum computing, quantum cryptography (quantum key distribution), quantum cryptanalysis (Shor's algorithm and Grover's algorithm), post-quantum cryptography and cryptographic agility.

Table of Contents:

00:00 - Introduction

00:31 - Outline

01:05 - Quantum Mechanics

13:13 - Quantum Computing

15:32 - “The Talk”

17:09 - Quantum Key Distribution

23:45 - Observation of Photons

27:19 - BB84 Quantum Key Distribution

30:29 - BB84 Reconciliation Stage

32:41 - Reconciliation Example

34:43 - Privacy Amplification

37:06 - Shor’s Algorithm

42:14 - The Quantum Circuit

43:04 - An Example of Shor’s Algorithm

43:22 - Presentation Paused

43:36 - Presentation Resumed

44:35 - An Example of Shor’s Algorithm

46:20 - Grover’s Algorithm

48:54 - Conclusions

51:14 - Post-Quantum Crypto

52:52 - NTRU

54:45 - McEliece Cryptosystem

56:58 - Google Trials

58:46 - Cryptographic Agility

1:01:53 - NSA CNSAS

1:04:35 - References and Further Reading

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here