This talk, aimed at engineers (rather than recent physics Ph.D.s), will explain the computation model of a quantum computer, why they would make deployed public key algorithms insecure, and intuition into how the important quantum algorithms (Grover’s and Shor’s) would work.
1: Understand the difference between a quantum computer and a classical computer.
2: Understand what types of problems quantum computers would be useful for.
3: Understand how the quantum algorithms that impact cryptography work.
This should be understandable to anyone with intellectual curiosity. However, it is deeply technical.
Protecting Data & Applied Crypto
key management data security cryptography authentication
Share With Your Community