back

Post-Quantum Cryptography

Detours, delays, and disasters

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:40:16
Language
English
Abstract
Post-quantum cryptography is an important branch of cryptography, studying cryptography under the threat model that the attacker has a quantum computer. Systems that can withstand quantum attacks are urgently needed but in many applications all parties need to agree on what system is used. NIST, the US National Institute for Standards and Technology, has been running a competition to select some systems as standards. This talk will report on the process and cover some of the interesting ways that the design, standardization, and deployment of post-quantum cryptography have been going wrong.

Stream-Link: https://streaming.media.ccc.de/jev22/fireshonks

Why do we still not use post-quantum cryptography? This talk sheds some light on what happened beyond the efforts of researchers to design good crypto and get it deployed. Bring your tinfoil hats.

Talk ID
jev22-49246
Event:
jev22
Day
4
Room
Fireshonks
Start
8 p.m.
Duration
00:40:00
Track
R3S
Type of
Talk
Speaker
D. J. Bernstein
Tanja Lange
Talk Slug & media link
jev22-49246-post_quantum_cryptography
English
0.0% Checking done0.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
100.0% Nothing done yet100.0%
  
100.0% Checking done100.0%
0.0% Nothing done yet0.0%
  

Work on this video on Amara!

English: Transcribed until

Last revision: 2 months ago