Post-quantum cryptography: Security after Shor’s algorithm
Вставка
- Опубліковано 16 лип 2024
- What’s the current status of the NIST Post-Quantum Cryptography Standardization?
Find out here: csrc.nist.gov/Projects/Post-Q...
Created by Kelsey Houston-Edwards (www.kelseyhoustonedwards.com)
Sponsored by Wire (www.wire.com)
________
Lattice-Based Cryptography: • Lattice-based cryptogr...
Learning with Errors: Coming Jan 5, 2023
________
Timestamps
0:00 - National Institute of Standards and Technology
0:48 - Cryptography uses hard math problems
2:00 - Shor's algorithm
3:22 - Post-quantum cryptography versus quantum cryptography
3:48 - Developing new cryptographic standards
4:51 - NIST standardization
6:05 - Lattice-based cryptography
________
NIST Standard Reference Materials (official website): www.nist.gov/srm
NIST Standard Reference Materials (video, Veritasium): • The world depends on a...
NIST Digital Library of Mathematical Functions (official website): dlmf.nist.gov/
NIST “Metric Continuum”: www.nist.gov/blogs/taking-mea...
RSA (lecture notes): engineering.purdue.edu/kak/co...
Diffie-Hellman (video, Numberphile): • Diffie Hellman -the Ma...
Shor’s Algorithm (original paper): arxiv.org/abs/quant-ph/9508027v2
Shor’s Algorithm, Part 1 (video, PBS Infinite Series): • How to Break Cryptogra...
Shor’s Algorithm, Part 2 (video, PBS Infinite Series):
• Hacking at Quantum Spe...
Supersingular Isogeny Key Exchange (article, Quanta Magazine): www.quantamagazine.org/post-q...
NIST Contest, Selected Algorithms 2022 (official website): csrc.nist.gov/projects/post-q...
NIST Contest, Round 4 Submissions (official website): csrc.nist.gov/projects/post-q...
best series of videos that explain lattice based crypto for masses.
I hear commenting boosts visibility on UA-cam, and you deserve higher visibility. Great job!
Good to see Kelsey after all these years
Always a joy listening to Dr. Houston-Edwards explain something complicated in a way that is approachable.
Great to have you back Dr. Houston-Edwards!
wow..what a clear explanation of everything in such a short video. All my doubts are cleared now,. Thankyou
I wrote my final paper on this topic for my junior-year cryptography course for my Cybersecurity degree. i really wish i had these videos because she summed up a month's worth of research and writing into 7 minutes. this is a really awesome channel and ive already watch several other videos, all of them were just as excellent! keep up the good content
So psyched to have you back, Kelsey! I can't wait for all the awesome content to come. Congrats on starting this new project, and welcome back to UA-cam!!
You are amazing at explaining things. Glad to see you again.
Keep up the good work! Videos that clearly explains cryptography concepts are in short supply.
This is an awesome video! I can't wait to see this channel speedrun to a million subscribers lol
Hahaha 😂 good comment. I hope that does happen!
Great to see Dr. Houston-Edwards back! Would Chalk Talk consider an episode on AI/ML? Gradient descents, optimization, GAN, what happens when multiple AIs are trained on similar data sets but given different weights, etc. I read "Life 3.0" by Max Tegmark and the introduction is haunting. With ChatGPT consuming so much creative bandwidth, how do the Tegmark predictions fit into our current observations?
These are incredibly good videos. I have watched them all more than once. Thank you so much for creating these.
Your videos are on point. Thank you for publishing them!
Well-articulated! Thank you.
Your videos are awesome! Very clear and informative.
Love your videos and channel. Thank you❤
thank u for sharing
quality content
0:34 “We’re not ‘anti-metric,’ we’re metrologically divergent.”
Throwback to PBS Infinite Series!
Great content well explained. I think however that DH using ephemeral keys which is mandated by tlsv1.3 will not allow for future exploitation if the entire DH conversation is captured. Is this correct ?
No. Ephemeral keys means they're just changed very often. A quantum computer could break all of these keys very fast and decrypt the conversation. However if you've stored a huge amount of ephemeral keys and need to break all of then it would take a while but we can't rely on that for post quantum cryptography.
IBM has built the quantum computer that can run Shor's.
What about AES 256?
that is also vulnerable
@@qazw5414 I don't think so. It will still offer 128 Bits of security which is still very high.
RIP SIKE
From vertasium