Speaker Series

Leadership in Technology

Speaker Series

"Leadership in Technology" Speakers Series Proudly Presents...


Photo of Tychansky

Richard Tychansky

Security Architect, Identity Dynamics Corp

The Drive towards Post-Quantum Computing Resistant Cryptographic Algorithm Standardization

Wednesday, November 15th, 6:30 PM; EB2 1231


The Drive towards Post-Quantum Computing Resistant Cryptographic Algorithm Standardization

Abstract:

You are now exiting the “Twilight Zone”. Access to Quantum Processing Units (QPUs) and native algorithms written in Qiskit are now a reality and it will soon put Internet commerce at risk for decryption. Running Shor’s algorithm to factor RSA is as easy as running native code on a quantum computing provider’s platform. This is the brave new world where RSA and Diffie-Hellman will no longer be trusted for Internet commerce. 

In this session we will examine the NIST candidate algorithms for public-key encryption, key-establishment algorithms and digital signatures. We will build an understanding of how each of the algorithms work and their susceptibility to different forms of cryptanalysis. Find out which algorithm is most resistant to cryptanalysis and how to prepare for the drive to strategically modernization cryptographic infrastructures.



Speaker Bio

Richard Tychansky (Research Triangle Park, NC), CISSP-ISSEP, GRCP, CSSLP, CCSP, PMP is a University of Toronto graduate and Security Architect. He is a quantum computing advocate for today’s developers. His 20 year career spans aerospace engineering with Lockheed Martin, commercial software product design with the SAS Institute, and recently with Google’s Security & Privacy division to protect the data of over a billion mobile device and Cloud services users. He is a very prolific and highly rated as a conference speaker and is a Community Champion for the more than 160,000 (ISC)2 cybersecurity professionals. He is also the author of the popular “Preparing for a Zero Trust Initiative” Professional Development Institute course.


Note to CSC Graduate Students

These lectures have been approved by the CSC Graduate Oversight Committee to count toward the required lectures for graduate students. Download seminar attendance form.


Watch the Talk