Quantum computing will decimate the security infrastructure of the digital economy. Quantum computing in general is certainly a blessing to humanity in many respects and it promises to disrupt evolution of technology in more than one dimensions. But it is also a curse to security, as cryptographic algorithms that proved to be secure for decade may be breached by quantum computers within minutes.
This explains why researchers all around the globe are ambitiously working on a new generation of cryptographic infrastructure and algorithms to withstand the quantum-enforced new generation of attack models. We speak of post-quantum cryptography “PQC”.
We at Utimaco have the honor to work with some of the leading researchers in quantum cryptography, who use our Hardware Security Modules.
The ultimate goal is to prepare:
In the context of Utimaco’s Applied Crypto Symposium we had the chance to interview 3 of the leading researchers, and to dive into their views and research agenda on post-quantum cryptography.
We will start with with Michele Mosca, co-founder and professor at the Institute of Quantum Computing at the University of Waterloo.
Michele firsts sketches out the playing field. Why do we actually push forward the development of quantum computers and what can we expect to be the major takeaways?
Then Michele describes the challenges of post-quantum cryptography. He emphasizes the crucial role of HSMs in PQC and explains why.
In the subsequent video publication, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center builds on Michele’s statements and describes PQC from a major industry player’s point of view. Samsung is a major player in the global B2C communication and entertainment industry. Connected devices are key to their future evolution. How will they handle it.
In the third video, Sandy Carielli, Security Technologies Director at Entrust Datacard will provide the perspective of a major security company. How can cards be made post-quantum proof and what may be their role in the post-quantum era.
The posts will be accompanied by discussions of NIST’s “semifinal” selection of post-quantum algorithms. The discussions will be led by security experts such as Peter Smirnoff, co-developer of the latest release of the GOST hash function or IT-journalist Terry Anton.
Watch this video
Be informed about the release of the next post-quantum related blogs and videos. Simply enroll to our info-mail with the subscription button on the top right.
Are you part of a research institute or department and interested in participating in our collaborative research programs, please contact us for additional information.