
Sign up to save your podcasts
Or


This conversation delves into the intersection of quantum computing and cryptography, focusing on the implications of quantum computers for current encryption methods and the necessity for post-quantum cryptography. Dr. Dustin Moody from NIST discusses the threats posed by quantum computing, particularly through Shor's algorithm, and the ongoing efforts to develop new cryptographic standards that can withstand these threats. The discussion also covers the role of NIST in standardizing post-quantum algorithms, the mathematical challenges involved, and the importance of preparing businesses for the transition to these new systems.
All opinions are of the individual scientist and do not reflect the opinions of NIST or the federal Government.
Takeaways
Keywords
quantum computing, cryptography, post-quantum cryptography, NIST, cybersecurity, Shor's algorithm, digital signatures, lattice-based algorithms, encryption, quantum threats
Subscribe to Breaking Math wherever you get your podcasts.
Become a patron of Breaking Math for as little as a buck a month
Follow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTok
Follow Autumn on Twitter and Instagram
Become a guest here
email: [email protected]
By Autumn Phaneuf4
329329 ratings
This conversation delves into the intersection of quantum computing and cryptography, focusing on the implications of quantum computers for current encryption methods and the necessity for post-quantum cryptography. Dr. Dustin Moody from NIST discusses the threats posed by quantum computing, particularly through Shor's algorithm, and the ongoing efforts to develop new cryptographic standards that can withstand these threats. The discussion also covers the role of NIST in standardizing post-quantum algorithms, the mathematical challenges involved, and the importance of preparing businesses for the transition to these new systems.
All opinions are of the individual scientist and do not reflect the opinions of NIST or the federal Government.
Takeaways
Keywords
quantum computing, cryptography, post-quantum cryptography, NIST, cybersecurity, Shor's algorithm, digital signatures, lattice-based algorithms, encryption, quantum threats
Subscribe to Breaking Math wherever you get your podcasts.
Become a patron of Breaking Math for as little as a buck a month
Follow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTok
Follow Autumn on Twitter and Instagram
Become a guest here
email: [email protected]

883 Listeners

1,707 Listeners

1,930 Listeners

946 Listeners

301 Listeners

832 Listeners

521 Listeners

351 Listeners

1,061 Listeners

77 Listeners

4,153 Listeners

2,337 Listeners

318 Listeners

391 Listeners

491 Listeners