Post-Quantum Crypto

Post-Quantum Crypto

Update: 2024-09-16
Share

Description

You may be vaguely aware of the term ‘quantum computing’ from media reports. But what you may not have picked up on is that one of the primary uses for quantum computers may be to break data encryption. Furthermore, you may not realize that if three-letter agencies can save off our encrypted emails and messages now, this could mean they could read them in the future when sufficiently powerful quantum computing becomes viable. How does this work? And what can we do about it now to protect our privacy in the future? We’ll dig into all of this today with Brandon Sundh from Tuta (formerly Tutanota), a prominent secure email company, who is already deploying such protections.


Interview Notes



Further Info



Table of Contents


Use these timestamps to jump to a particular section of the show.



  • 0:02:50 : Some terminology first

  • 0:07:33 : What is quantum computing and what’s it good for?

  • 0:16:25 : What are the currrent capabilities of quantum computers?

  • 0:22:02 : How long have we been working on quantum computers?

  • 0:25:01 : If QC is still so far off, why do we need to prepare now?

  • 0:30:53 : How do we design encryption to make it safe against quantum computers?

  • 0:36:10 : How can we be sure that the NSA isn’t buillding backdoors into these algorithms?

  • 0:41:11 : Will post-quantum algorithms replace current ones or augment them?

  • 0:45:51 : How soon will quantum-safe crypto be roled out?

  • 0:52:42 : Who will be able to own and operate these quantum computers?

  • 0:54:45 : Are law enforcement agencies pushing back against quantum-safe crypto?

  • 1:00:34 : Who is more likely to win: coder makers or code breakers?

  • 1:04:24 : Wrap-up

  • 1:05:55 : Looking ahead

Comments 
In Channel
Malware Reboot Remedy

Malware Reboot Remedy

2024-09-2301:02:42

Post-Quantum Crypto

Post-Quantum Crypto

2024-09-1601:08:27

The Truth is Out There

The Truth is Out There

2024-09-0901:14:03

Crazy Proton Summer

Crazy Proton Summer

2024-09-0201:16:33

National Public Data Breach

National Public Data Breach

2024-08-2601:21:49

Dating App Privacy

Dating App Privacy

2024-08-1901:00:56

Catch You on the BSide

Catch You on the BSide

2024-08-0501:14:41

Open Source Intelligence

Open Source Intelligence

2024-07-2201:21:54

How & Why to Block Ads

How & Why to Block Ads

2024-07-1501:18:19

Promising Privacy Tech

Promising Privacy Tech

2024-07-0801:11:12

Backing Up Other Data

Backing Up Other Data

2024-07-0101:19:54

Means of Control

Means of Control

2024-06-2401:12:35

Backup Your Cloud Data

Backup Your Cloud Data

2024-06-1701:06:11

Migrate to Mastodon

Migrate to Mastodon

2024-06-0301:05:28

Why Privacy Matters

Why Privacy Matters

2024-05-2701:07:42

How to Choose a PIN

How to Choose a PIN

2024-05-2001:11:05

loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Post-Quantum Crypto

Post-Quantum Crypto

Carey Parker