Next Generation Information Security with Quantum Key Distribution (QKD) Deployment

Sponsored By: TeleStrategies' ISS WorldŽ

Presented by:
Dr. Jerry Lucas, President, TeleStrategies
Dr. Bruno Huttner, Quantum Safe Product Manager, ID Quantique

February 22, 2017: Online Webinar

TIME: 9:00-10:00 AM New York Time, Eastern USA, 3:00-4:00 PM Switzerland Time

Free and only for law enforcement, the government and private sector intelligence community and cyber security vendors. Registration with Government or Corporate e-mail address is required.

Click here to register  Click Here To Register


Next Generation Information Security with Quantum Key Distribution (QKD) Deployment

Quantum Computers capable of defeating today's Crypto Systems are on the horizon. It is not a matter of if anymore, but of when. In order to avoid major disruptions, Government and Private sector security management have to start to transition their information security infrastructure now. The goal is to achieve a complete Quantum-Safe infrastructure before operational quantum computers are deployed.

This webinar is for government and private sector security managers who have already accepted the fact that quantum computers will be deployed in the not-too-distant future, which will make their organizations cryptography infrastructure obsolete. The content of this webinar is focused on information security management issues. It is suitable for attendees, who do not have a background in quantum physics, computer science, or mathematical algorithms.

Regarding content, this webinar briefly addresses what parts of today's cryptography is vulnerable to quantum computer defeat and what counter alternatives are available. There are two defensive architectures: first,Quantum Key Distribution (QKD) and second, Quantum Resistant Algorithms (QRAs). QKD based on Quantum Physics will be addressed in this webinar. The second option, QRAs, which are public key infrastructure algorithms based on mathematics and not quantum physics will be briefly summarized in this webinar but more fully addressed in a follow-up webinar scheduled for March 1, 2017.

Quantum Computer Basics ( a 10 minute overview): First, which cryptosystem components are vulnerable to quantum computers, followed by: what is a quantum computer; how it works (without a lot of quantum physics or complex maths); what is a qubit and what is quantum entanglement; cryptography breaking algorithms (Shor and Grover) basics; and the single most important performance metric to track when reached.

Quantum Resistant Algorithms (a 10 minute overview): Difference between today's PKI and QRAs that makes them quantum safe, high level overview (light on maths) of leading QRAs options: Hash Signature; Lattice Key; Code-Based; and NIST/ETSI standard activities.

Presented by:
Dr. Jerry Lucas,
President, TeleStrategies

Quantum Key Distribution (a 40 minute session): The session introduces the principles and QKD and discusses its integration into a quantum-safe security infrastructure. It covers the following: Principles of QKD (quantum channel, authentication, key distillation); Current commercial implementations; Point-to-point versus point-to multipoint systems; Increasing the distance range with Trusted Nodes and free space key distribution; Some use cases (government, finance, data centers...); Roadmap, the future of QKD.

Presented by:
Dr. Bruno Huttner,
Quantum Safe Product Manager, ID Quantique

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2017
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

voice:
703-734-7050 fax:703-893-3197