Post-Quantum Computing Encryption
This presentation developed out of a IT professional concern of the threat quantum computers pose to asymmetric encryption. Asymmetric encryption underpins the security of the internet and protects almost all data in flight, including bank and shopping transactions. Today hackers are collecting data in a scheme called “harvest now; decrypt later,” where once a quantum computer of sufficient size is developed the hackers will be able to break the asymmetric encryption keys in hours, minutes or even seconds. Those keys in turn gives a hacker access to the symmetrical keys that can then be used to decrypt the captured data. As a financial institution this threat is of grave concern to us and needed to be understood. This presentation is a result of that endeavor and will go over the basics of how quantum computers work, the state of the art, quantum utility/advantage/supremacy, and the threat to encryption that quantum computers pose.
Date and Time
Location
Hosts
Registration
-
Add Event to Calendar
- 33800 Inwood Drive
- Solon, Ohio
- United States
- Building: Solon Library
Speakers
Steven of Cleveland IEEE
Overview of IEEE
Biography:
Chair of Cleveland IEEE, Senior Life Member of IEEE, member for 44 years
Email:
Address:3967 Cindy Lane, , Seven Hills, Ohio, United States, 44131
Bill
Post-quantum Computing Encryption
Biography:
I am from Omaha, NE and graduated with a BSEE from the University of Kansas, class of 1999. I have been in the IT profession as a network engineer for 26 years designing and operating networks for internet service prodivers, data center providers, enterprises and in manufacturing environments. I currently work for Third Federal, a local Cleveland bank, as a network engineer building and operating their networks and firewalls. I’m married with two sons and love spending time with them. When not working or with family I enjoy playing the ukulele, kayaking, and painting D&D miniatures.
Email:
Address:United States
Agenda
6:00 Registration, snacking, networking
6:30 Overview of IEEE
6:30 Main presentation, Q&A