generated from cloud-gov/pages-uswds-jekyll
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #1136 from GSA/cms/events/quantum-speaker-series-p…
…resents-elliptic-curve-cryptography-the-canary-in-the-quantum-coal-mine Automatically generated. Merged on Netlify CMS.
- Loading branch information
Showing
1 changed file
with
27 additions
and
0 deletions.
There are no files selected for viewing
27 changes: 27 additions & 0 deletions
27
...ies-presents-elliptic-curve-cryptography-the-canary-in-the-quantum-coal-mine.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
--- | ||
layout: events | ||
organizer: ATARC | ||
url-link: https://atarc.org/event/ellipiticcurvecryptography/ | ||
title: "Quantum Speaker Series Presents: Elliptic Curve Cryptography, the Canary | ||
in the Quantum Coal Mine" | ||
description: In this presentation, we cover the latest trends in quantum | ||
hardware and algorithms for cryptanalysis. We review the basics of ECC and its | ||
deployment in digital infrastructures and locate attacks on ECC in the | ||
application landscape of quantum computers. | ||
clp: false | ||
start-time: 2025-01-14T13:00:00.000-00:00 | ||
end-time: 2025-01-14T14:00:00.000-00:00 | ||
event-type: Online | ||
gov-only: true | ||
is-external: true | ||
synopsis: >- | ||
While most forward-looking studies about cryptographically relevant quantum | ||
computers (CRQC) focus on the threat to factoring and the risks associated to | ||
securing data against harvest now, decrypt later attacks, systems reliant on | ||
elliptic curve cryptography (ECC) are bound to be the first vulnerable to | ||
quantum attacks.\ | ||
\ | ||
In this presentation, we cover the latest trends in quantum hardware and algorithms for cryptanalysis. We review the basics of ECC and its deployment in digital infrastructures and locate attacks on ECC in the application landscape of quantum computers. From physical and economical considerations, we estimate a plausible range for the cost of quantum attacks and the rate at which such attacks can occur at the onset of the fault tolerant regime. | ||
--- |