Ep 63 - Quantum Computing
Conf T with your SE - Ein Podcast von Bryan Young
Kategorien:
Episode Summary: In this episode, Bryan Young invites Igor Barshteyn to demystify quantum computing and its implications for cybersecurity. They dive into the intricacies of how quantum computing challenges current encryption methods, specifically public key cryptography, and what that means for data security. The discussion pivots around the looming necessity for transition to post-quantum cryptography and the roles that various entities like NIST, NSA, and leading tech companies are playing in this arena. Key Points Discussed: Quantum computing's impact on current encryption standards. How recorded encrypted data can be at risk in the future with advancements in quantum computing. The urgency and challenges in transitioning to post-quantum cryptography. The roles of NIST and NSA in standardizing new cryptographic measures. The legal and personal implications for CISOs in the wake of cybersecurity breaches. Global efforts towards developing quantum-resistant cryptographic standards. Notable Quotes: "Quantum computers can rapidly factor large numbers, breaking the key establishment part of encryption protocols." "The threat of quantum computing on data security is here now due to the ability to capture and store encrypted data for future decryption." "There's a cybersecurity jobs crisis looming with the emergence of quantum computing technology." Resources Mentioned: SolarWinds lawsuit article NIST's post-quantum cryptography project Open Quantum Safe project Call to Action: For listener questions and feedback: [email protected] Join the Conf T Discord community to engage in discussions: https://discord.conft.show Visit the Conf T merch shop: Conf T Merch Closing Thoughts: Bryan and Igor emphasize the importance of staying informed and proactive in the face of quantum computing's challenges to cybersecurity. They encourage listeners to audit their encryption protocols and prepare for the inevitable transition to quantum-resistant cryptography.