Post-Quantum Computing Encryption

#computers #encryption #quantum-computing
Share

This presentation developed out of a IT professional concern of the threat quantum computers pose to asymmetric encryption.  Asymmetric encryption underpins the security of the internet and protects almost all data in flight, including bank and shopping transactions.  Today hackers are collecting data in a scheme called “harvest now; decrypt later,” where once a quantum computer of sufficient size is developed the hackers will be able to break the asymmetric encryption keys in hours, minutes or even seconds.  Those keys in turn gives a hacker access to the symmetrical keys that can then be used to decrypt the captured data.  As a financial institution this threat is of grave concern to us and needed to be understood.  This presentation is a result of that endeavor and will go over the basics of how quantum computers work, the state of the art, quantum utility/advantage/supremacy, and the threat to encryption that quantum computers pose.



  Date and Time

  Location

  Hosts

  Registration



  • Add_To_Calendar_icon Add Event to Calendar
If you are not a robot, please complete the ReCAPTCHA to display virtual attendance info.
  • 33800 Inwood Drive
  • Solon, Ohio
  • United States
  • Building: Solon Library

  • Contact Event Host
  • Starts 08 August 2025 04:00 AM UTC
  • Ends 15 September 2025 04:00 AM UTC
  • No Admission Charge


  Speakers

Steven of Cleveland IEEE

Topic:

Overview of IEEE

Biography:

Chair of Cleveland IEEE, Senior Life Member of IEEE, member for 44 years

Email:

Address:3967 Cindy Lane, , Seven Hills, Ohio, United States, 44131

Bill

Topic:

Post-quantum Computing Encryption

Biography:

I am from Omaha, NE and graduated with a BSEE from the University of Kansas, class of 1999.  I have been in the IT profession as a network engineer for 26 years designing and operating networks for internet service prodivers, data center providers, enterprises and in manufacturing environments.  I currently work for Third Federal, a local Cleveland bank, as a network engineer building and operating their networks and firewalls.  I’m married with two sons and love spending time with them.  When not working or with family I enjoy playing the ukulele, kayaking, and painting D&D miniatures.

Email:

Address:United States






Agenda

6:00 Registration, snacking, networking

6:30 Overview of IEEE

6:30 Main presentation, Q&A