Demystifying Quantum Computers (Overflow)

Posted on in Presentations

This talk, aimed at engineers (rather than recent physics Ph.D.s), will explain the computation model of a quantum computer, why they would make deployed public key algorithms insecure, and intuition into how the important quantum algorithms (Grover’s and Shor’s) would work.

Learning Objectives:
1: Understand the difference between a quantum computer and a classical computer.
2: Understand what types of problems quantum computers would be useful for.
3: Understand how the quantum algorithms that impact cryptography work.

This should be understandable to anyone with intellectual curiosity. However, it is deeply technical.

Charles Kaufman

Security Architect, Dell EMC

Radia Perlman

Fellow, Dell EMC

Protecting Data & Applied Crypto

key management data security cryptography authentication



Share With Your Community