BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250918T224757Z
UID:FACBF3D4-DB73-4AFD-9C67-4667ADEE6C70
DTSTART;TZID=America/New_York:20250915T180000
DTEND;TZID=America/New_York:20250915T200000
DESCRIPTION:This presentation developed out of a IT professional concern of
  the threat quantum computers pose to asymmetric encryption. Asymmetric en
 cryption underpins the security of the internet and protects almost all da
 ta in flight\, including bank and shopping transactions. Today hackers are
  collecting data in a scheme called “harvest now\; decrypt later\,” wh
 ere once a quantum computer of sufficient size is developed the hackers wi
 ll be able to break the asymmetric encryption keys in hours\, minutes or e
 ven seconds. Those keys in turn gives a hacker access to the symmetrical k
 eys that can then be used to decrypt the captured data. As a financial ins
 titution this threat is of grave concern to us and needed to be understood
 . This presentation is a result of that endeavor and will go over the basi
 cs of how quantum computers work\, the state of the art\, quantum utility/
 advantage/supremacy\, and the threat to encryption that quantum computers 
 pose.\n\nSpeaker(s): Steven\, Bill\n\nAgenda: \n6:00 Registration\, snacki
 ng\, networking\n\n6:30 Overview of IEEE\n\n6:30 Main presentation\, Q&amp;A\n
 \nBldg: Solon Library\, 34125 Portz Parkway\, Solon\, Ohio\, United States
 \, Virtual: https://events.vtools.ieee.org/m/496002
LOCATION:Bldg: Solon Library\, 34125 Portz Parkway\, Solon\, Ohio\, United 
 States\, Virtual: https://events.vtools.ieee.org/m/496002
ORGANIZER:s.galecki@ieee.org
SEQUENCE:15
SUMMARY:Post-Quantum Computing Encryption
URL;VALUE=URI:https://events.vtools.ieee.org/m/496002
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;This presentation developed out of a IT pr
 ofessional concern of the threat quantum computers pose to asymmetric encr
 yption.&amp;nbsp\; Asymmetric encryption underpins the security of the interne
 t and protects almost all data in flight\, including bank and shopping tra
 nsactions.&amp;nbsp\; Today hackers are collecting data in a scheme called &amp;ld
 quo\;harvest now\; decrypt later\,&amp;rdquo\; where once a quantum computer o
 f sufficient size is developed the hackers will be able to break the asymm
 etric encryption keys in hours\, minutes or even seconds.&amp;nbsp\; Those key
 s in turn gives a hacker access to the symmetrical keys that can then be u
 sed to decrypt the captured data.&amp;nbsp\; As a financial institution this t
 hreat is of grave concern to us and needed to be understood.&amp;nbsp\; This p
 resentation is a result of that endeavor and will go over the basics of ho
 w quantum computers work\, the state of the art\, quantum utility/advantag
 e/supremacy\, and the threat to encryption that quantum computers pose.&lt;/p
 &gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;6:00 Registration\, snacking\, networking&lt;/p
 &gt;\n&lt;p&gt;6:30 Overview of IEEE&lt;/p&gt;\n&lt;p&gt;6:30 Main presentation\, Q&amp;amp\;A&lt;/p&gt;
END:VEVENT
END:VCALENDAR

