Compiler

Post-quantum Cryptography

8 snips
Mar 5, 2026
Simo Sorce, Distinguished Engineer at Red Hat who leads their UX crypto team and focuses on post-quantum security. He explains what quantum computing threatens in cryptography. He uses clear analogies to unpack public-key concepts. He outlines harvest-now/decrypt-later risk, progress toward quantum hardware, and the practical challenges of migrating to quantum-resistant algorithms.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Quantum Algorithms Threaten RSA And ECC

  • Quantum computers change the problem-solving paradigm, enabling algorithms like Shor's to break RSA and ECC keys much faster than classical computers.
  • Simo Sorce warns a sufficiently large quantum machine could recover private keys in minutes or hours, not years.
INSIGHT

Harvest Now Decrypt Later Risk

  • Nation states and others perform 'harvest now, decrypt later' by recording encrypted traffic today to decrypt once quantum capability exists.
  • Simo explains they store full communications hoping future quantum computers will recover keys and reveal sensitive past data.
INSIGHT

Some Harvested Data Keeps LongTerm Value

  • Much encrypted internet traffic is low-value but some records remain valuable long-term, making selective harvested archives worth decrypting later.
  • Hosts note harvested data may be outdated, but sensitive items like health, financial, or IP retain long-term value.
Get the Snipd Podcast app to discover more snips from this episode
Get the app