Post-quantum Cryptography
8 snips
Mar 5, 2026 Simo Sorce, Distinguished Engineer at Red Hat who leads their UX crypto team and focuses on post-quantum security. He explains what quantum computing threatens in cryptography. He uses clear analogies to unpack public-key concepts. He outlines harvest-now/decrypt-later risk, progress toward quantum hardware, and the practical challenges of migrating to quantum-resistant algorithms.
AI Snips
Chapters
Transcript
Episode notes
Quantum Algorithms Threaten RSA And ECC
- Quantum computers change the problem-solving paradigm, enabling algorithms like Shor's to break RSA and ECC keys much faster than classical computers.
- Simo Sorce warns a sufficiently large quantum machine could recover private keys in minutes or hours, not years.
Harvest Now Decrypt Later Risk
- Nation states and others perform 'harvest now, decrypt later' by recording encrypted traffic today to decrypt once quantum capability exists.
- Simo explains they store full communications hoping future quantum computers will recover keys and reveal sensitive past data.
Some Harvested Data Keeps LongTerm Value
- Much encrypted internet traffic is low-value but some records remain valuable long-term, making selective harvested archives worth decrypting later.
- Hosts note harvested data may be outdated, but sensitive items like health, financial, or IP retain long-term value.
