|Defeating Encryption with Quantum Computing: From Public Key Input to Private Key Output, Step-by-Quantum Circuit Step
Sponsored By: TeleStrategies' ISS WorldŽ
August 7, 2018 : Online Webinar
TIME: 9:00-10:00 AM New York Time, Eastern USA Time
Free for Law Enforcement, the government intelligence community and private enterprise cyber security managers. Registration with Government or Corporate e-mail address is required.
Click Here To Register
Defeating Encryption with Quantum Computing: From Public Key Input to Private Key Output, Step-by-Quantum Circuit Step
Countless news articles have been written about quantum computers, the magic of entangled qubits and all the new business opportunities that will be created with these general-purpose computing machines. But what is not addressed in these articles is you don’t need a general purpose quantum computer to defeat today’s cryptography. While these general-purpose machines are likely a decade away from deployment, an application specific quantum computer designed for one purpose only, e.g. defeating today’s public key encryption may be but a few years away.
This webinar is for cyber security executives and specialists who have the responsibility of assessing the lead time they have before deploying quantum safe cryptography solutions. If you believe nation state security agencies are developing quantum computers to decrypt your past and future intercepted transmission sessions, this high level webinar should be a must attend briefing.
"Keep it simple but not that simple"
Meantime in order to make this lead time assessment for quantum safe cryptography deployment you need to track performance metrics of key components of quantum computer technology. And to do this you need to understand how a quantum computer work when designed for the sole purpose of defeating public key encryption only.
This "30,000 foot view" Webinar (10 sessions, 5 minutes each) Addresses:
All Contents Copyright © 2018