65: Getting Ready for Post-Quantum Cryptography
Description
We don’t know when but at some point in the future we will face what researchers call a "Quantum Apocalypse". This is when quantum computers will be able to break many of our existing encryption algorithms. To keep Meta’a users safe even from attacks that don’t even exist today, Sheran and Rafael are working on post-quantum-ready encryption. Tune in to learn about the various challenges and trade offs that this work brings with it.
Got feedback? Send it to us on Threads (https://threads.net/@metatechpod), Twitter (https://twitter.com/metatechpod), Instagram (https://instagram.com/metatechpod) and don’t forget to follow our host @passy (https://twitter.com/passy, https://mastodon.social/@passy, and https://threads.net/@passy_). Fancy working with us? Check out https://www.metacareers.com/.
Links
-
Post-quantum readiness for TLS at Meta: https://engineering.fb.com/2024/05/22/security/post-quantum-readiness-tls-pqr-meta/
-
Fizz TLS implementation: https://github.com/facebookincubator/fizz
-
NIST Post-Quantum Cryptography Submissions: https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-3-submissions
Timestamps
-
Intro 0:06
-
Meta Open Source 101 1:10
-
Intros 1:49
-
Sheran Intro 2:31
-
Rafael Intro 3:37
-
Then Quantum Apocalypse 5:24
-
Why symmetric and asymmetric algos behave differently 8:10
-
Why invest in tomorrow's problems? 9:21
-
First deployment target 14:17
-
Choosing an algorithm 18:06
-
Choosing the right parameters 19:51
-
Performance costs and wins 21:28
-
Stack 23:33
-
Challenges 25:26
-
What's next for PQC? 30:38
-
Working with NIST 32:59
-
Outro 34:30
-
Outtakes 35:43