
Sign up to save your podcasts
Or


This conversation delves into the intersection of quantum computing and cryptography, focusing on the implications of quantum computers for current encryption methods and the necessity for post-quantum cryptography. Dr. Dustin Moody from NIST discusses the threats posed by quantum computing, particularly through Shor's algorithm, and the ongoing efforts to develop new cryptographic standards that can withstand these threats. The discussion also covers the role of NIST in standardizing post-quantum algorithms, the mathematical challenges involved, and the importance of preparing businesses for the transition to these new systems.
All opinions are of the individual scientist and do not reflect the opinions of NIST or the federal Government.
Takeaways
Keywords
quantum computing, cryptography, post-quantum cryptography, NIST, cybersecurity, Shor's algorithm, digital signatures, lattice-based algorithms, encryption, quantum threats
Subscribe to Breaking Math wherever you get your podcasts.
Become a patron of Breaking Math for as little as a buck a month
Follow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTok
Follow Autumn on Twitter and Instagram
Become a guest here
email: [email protected]
By Autumn Phaneuf & Noah Giansiracusa4
329329 ratings
This conversation delves into the intersection of quantum computing and cryptography, focusing on the implications of quantum computers for current encryption methods and the necessity for post-quantum cryptography. Dr. Dustin Moody from NIST discusses the threats posed by quantum computing, particularly through Shor's algorithm, and the ongoing efforts to develop new cryptographic standards that can withstand these threats. The discussion also covers the role of NIST in standardizing post-quantum algorithms, the mathematical challenges involved, and the importance of preparing businesses for the transition to these new systems.
All opinions are of the individual scientist and do not reflect the opinions of NIST or the federal Government.
Takeaways
Keywords
quantum computing, cryptography, post-quantum cryptography, NIST, cybersecurity, Shor's algorithm, digital signatures, lattice-based algorithms, encryption, quantum threats
Subscribe to Breaking Math wherever you get your podcasts.
Become a patron of Breaking Math for as little as a buck a month
Follow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTok
Follow Autumn on Twitter and Instagram
Become a guest here
email: [email protected]

858 Listeners

1,708 Listeners

1,953 Listeners

947 Listeners

323 Listeners

836 Listeners

543 Listeners

365 Listeners

1,060 Listeners

82 Listeners

4,167 Listeners

2,366 Listeners

324 Listeners

383 Listeners

498 Listeners