Post-quantum cryptography: Security after Shor’s algorithm
ฝัง
- เผยแพร่เมื่อ 12 มิ.ย. 2024
- What’s the current status of the NIST Post-Quantum Cryptography Standardization?
Find out here: csrc.nist.gov/Projects/Post-Q...
Created by Kelsey Houston-Edwards (www.kelseyhoustonedwards.com)
Sponsored by Wire (www.wire.com)
________
Lattice-Based Cryptography: • Lattice-based cryptogr...
Learning with Errors: Coming Jan 5, 2023
________
Timestamps
0:00 - National Institute of Standards and Technology
0:48 - Cryptography uses hard math problems
2:00 - Shor's algorithm
3:22 - Post-quantum cryptography versus quantum cryptography
3:48 - Developing new cryptographic standards
4:51 - NIST standardization
6:05 - Lattice-based cryptography
________
NIST Standard Reference Materials (official website): www.nist.gov/srm
NIST Standard Reference Materials (video, Veritasium): • The world depends on a...
NIST Digital Library of Mathematical Functions (official website): dlmf.nist.gov/
NIST “Metric Continuum”: www.nist.gov/blogs/taking-mea...
RSA (lecture notes): engineering.purdue.edu/kak/co...
Diffie-Hellman (video, Numberphile): • Diffie Hellman -the Ma...
Shor’s Algorithm (original paper): arxiv.org/abs/quant-ph/9508027v2
Shor’s Algorithm, Part 1 (video, PBS Infinite Series): • How to Break Cryptogra...
Shor’s Algorithm, Part 2 (video, PBS Infinite Series):
• Hacking at Quantum Spe...
Supersingular Isogeny Key Exchange (article, Quanta Magazine): www.quantamagazine.org/post-q...
NIST Contest, Selected Algorithms 2022 (official website): csrc.nist.gov/projects/post-q...
NIST Contest, Round 4 Submissions (official website): csrc.nist.gov/projects/post-q...
I hear commenting boosts visibility on TH-cam, and you deserve higher visibility. Great job!
Always a joy listening to Dr. Houston-Edwards explain something complicated in a way that is approachable.
Well-articulated! Thank you.
Great to have you back Dr. Houston-Edwards!
Good to see Kelsey after all these years
wow..what a clear explanation of everything in such a short video. All my doubts are cleared now,. Thankyou
I wrote my final paper on this topic for my junior-year cryptography course for my Cybersecurity degree. i really wish i had these videos because she summed up a month's worth of research and writing into 7 minutes. this is a really awesome channel and ive already watch several other videos, all of them were just as excellent! keep up the good content
You are amazing at explaining things. Glad to see you again.
So psyched to have you back, Kelsey! I can't wait for all the awesome content to come. Congrats on starting this new project, and welcome back to TH-cam!!
Keep up the good work! Videos that clearly explains cryptography concepts are in short supply.
These are incredibly good videos. I have watched them all more than once. Thank you so much for creating these.
This is an awesome video! I can't wait to see this channel speedrun to a million subscribers lol
Hahaha 😂 good comment. I hope that does happen!
Great to see Dr. Houston-Edwards back! Would Chalk Talk consider an episode on AI/ML? Gradient descents, optimization, GAN, what happens when multiple AIs are trained on similar data sets but given different weights, etc. I read "Life 3.0" by Max Tegmark and the introduction is haunting. With ChatGPT consuming so much creative bandwidth, how do the Tegmark predictions fit into our current observations?
Your videos are awesome! Very clear and informative.
Your videos are on point. Thank you for publishing them!
Love your videos and channel. Thank you❤
thank u for sharing
quality content
What about AES 256?
Throwback to PBS Infinite Series!
0:34 “We’re not ‘anti-metric,’ we’re metrologically divergent.”
Great content well explained. I think however that DH using ephemeral keys which is mandated by tlsv1.3 will not allow for future exploitation if the entire DH conversation is captured. Is this correct ?
No. Ephemeral keys means they're just changed very often. A quantum computer could break all of these keys very fast and decrypt the conversation. However if you've stored a huge amount of ephemeral keys and need to break all of then it would take a while but we can't rely on that for post quantum cryptography.
IBM has built the quantum computer that can run Shor's.
RIP SIKE
From vertasium