Post-quantum cryptography: Security after Shor’s algorithm
What’s the current status of the NIST Post-Quantum Cryptography Standardization?
Find out here: csrc.nist.gov/Projects/Post-Q...
Created by Kelsey Houston-Edwards (www.kelseyhoustonedwards.com)
Sponsored by Wire (www.wire.com)
________
Lattice-Based Cryptography: • Lattice-based cryptogr...
Learning with Errors: Coming Jan 5, 2023
________
Timestamps
0:00 - National Institute of Standards and Technology
0:48 - Cryptography uses hard math problems
2:00 - Shor's algorithm
3:22 - Post-quantum cryptography versus quantum cryptography
3:48 - Developing new cryptographic standards
4:51 - NIST standardization
6:05 - Lattice-based cryptography
________
NIST Standard Reference Materials (official website): www.nist.gov/srm
NIST Standard Reference Materials (video, Veritasium): • The world depends on a...
NIST Digital Library of Mathematical Functions (official website): dlmf.nist.gov/
NIST “Metric Continuum”: www.nist.gov/blogs/taking-mea...
RSA (lecture notes): engineering.purdue.edu/kak/co...
Diffie-Hellman (video, Numberphile): • Diffie Hellman -the Ma...
Shor’s Algorithm (original paper): arxiv.org/abs/quant-ph/9508027v2
Shor’s Algorithm, Part 1 (video, PBS Infinite Series): • How to Break Cryptogra...
Shor’s Algorithm, Part 2 (video, PBS Infinite Series):
• Hacking at Quantum Spe...
Supersingular Isogeny Key Exchange (article, Quanta Magazine): www.quantamagazine.org/post-q...
NIST Contest, Selected Algorithms 2022 (official website): csrc.nist.gov/projects/post-q...
NIST Contest, Round 4 Submissions (official website): csrc.nist.gov/projects/post-q...
Пікірлер: 29
best series of videos that explain lattice based crypto for masses.
I hear commenting boosts visibility on KZread, and you deserve higher visibility. Great job!
Good to see Kelsey after all these years
Great to have you back Dr. Houston-Edwards!
Always a joy listening to Dr. Houston-Edwards explain something complicated in a way that is approachable.
You are amazing at explaining things. Glad to see you again.
wow..what a clear explanation of everything in such a short video. All my doubts are cleared now,. Thankyou
So psyched to have you back, Kelsey! I can't wait for all the awesome content to come. Congrats on starting this new project, and welcome back to KZread!!
I wrote my final paper on this topic for my junior-year cryptography course for my Cybersecurity degree. i really wish i had these videos because she summed up a month's worth of research and writing into 7 minutes. this is a really awesome channel and ive already watch several other videos, all of them were just as excellent! keep up the good content
Keep up the good work! Videos that clearly explains cryptography concepts are in short supply.
These are incredibly good videos. I have watched them all more than once. Thank you so much for creating these.
Your videos are on point. Thank you for publishing them!
Well-articulated! Thank you.
Your videos are awesome! Very clear and informative.
This is an awesome video! I can't wait to see this channel speedrun to a million subscribers lol
@bigpopakap
Жыл бұрын
Hahaha 😂 good comment. I hope that does happen!
Love your videos and channel. Thank you❤
thank u for sharing
Great to see Dr. Houston-Edwards back! Would Chalk Talk consider an episode on AI/ML? Gradient descents, optimization, GAN, what happens when multiple AIs are trained on similar data sets but given different weights, etc. I read "Life 3.0" by Max Tegmark and the introduction is haunting. With ChatGPT consuming so much creative bandwidth, how do the Tegmark predictions fit into our current observations?
quality content
Great content well explained. I think however that DH using ephemeral keys which is mandated by tlsv1.3 will not allow for future exploitation if the entire DH conversation is captured. Is this correct ?
@notnot2296
10 ай бұрын
No. Ephemeral keys means they're just changed very often. A quantum computer could break all of these keys very fast and decrypt the conversation. However if you've stored a huge amount of ephemeral keys and need to break all of then it would take a while but we can't rely on that for post quantum cryptography.
What about AES 256?
Throwback to PBS Infinite Series!
0:34 “We’re not ‘anti-metric,’ we’re metrologically divergent.”
IBM has built the quantum computer that can run Shor's.
RIP SIKE
From vertasium