
RunAs Radio Asymmetric Encryption with Eli Holderness
5 snips
Sep 18, 2024 Eli Holderness, an expert in encryption technologies, dives into the fascinating world of asymmetric encryption. He explains the importance of public and private keys in securing communications. The conversation also highlights the looming threats of quantum computing and the need for quantum-resistant algorithms. Eli introduces newcomers like Dilithium and Kyber, discussing their potential to secure our digital future. The talk wraps up with insights on evolving encryption standards and the role of initiatives like Let's Encrypt in safeguarding online security.
AI Snips
Chapters
Transcript
Episode notes
Quantum Threat to Encryption
- Quantum computers threaten current encryption by solving hard math problems.
- Shor's algorithm can break both RSA and elliptic curve cryptography.
Isogeny Cryptography
- Elliptic curve cryptography relies on the difficulty of the elliptic curve discrete logarithm problem.
- Isogeny-based cryptography, proposed as post-quantum secure, has been found insecure.
Post-Quantum Cryptography
- Lattice-based cryptography, like Crystals-Dilithium and Kyber, offers post-quantum security.
- NIST has approved these algorithms for post-quantum key exchange and digital signatures.
