<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PKI and Quantum Computing in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20357#M1018</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;Quantum Computing will enable us to fully enable FHE - it is a stepping stone.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hopefully a day will come when we can all realize &lt;A href="https://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf" target="_blank" rel="noopener"&gt;Craig Gentry's&lt;/A&gt; work on FHE using ideas lattices...&lt;/P&gt;</description>
    <pubDate>Thu, 21 Mar 2019 18:25:59 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2019-03-21T18:25:59Z</dc:date>
    <item>
      <title>PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20044#M969</link>
      <description>&lt;P&gt;The thought of Quantum computing advances and Quantum computers being freely available will make our current cryptographic systems redundant. PKI will expire soon. &amp;nbsp;Are there new algorithms being developed and also what is the approach. Is the NSA doing something about this? Is it something on your Organisation's radar today ?&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.yemi.tech/info-sec-blog/2018/2/15/quantum-computing-breakthrough-a-new-threat-to-cryptographic-systems" target="_blank"&gt;https://www.yemi.tech/info-sec-blog/2018/2/15/quantum-computing-breakthrough-a-new-threat-to-cryptographic-systems&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:08:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20044#M969</guid>
      <dc:creator>Tiger</dc:creator>
      <dc:date>2023-10-09T09:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20049#M971</link>
      <description>&lt;P&gt;A lot of people still dispel the myth of quantum computing, but the threat to "traditional" cryptographic algorithms is real. Even Bruce Schneier agrees. NSA has issued interim guidance (basically, use longer keys) to guide organizations prior to transitioning to quantum resistant algorithms. Notably, NIST is currently working with cryptographers on Post-Quantum Standardization. here's a link to the project:&amp;nbsp;&lt;A href="https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Post-Quantum-Cryptography-Standardization" target="_blank"&gt;https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Post-Quantum-Cryptography-Standardization&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, look for Quantum-Cloud-Computing as-a-service to take off. Today, you can get time on IBM Q, D-Wave, Forest, and even with Microsoft Azure integration. Hello AWS where are you in this space?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 14:22:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20049#M971</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-03-13T14:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20056#M974</link>
      <description>&lt;P&gt;&amp;gt; Tiger (Viewer) posted a new topic in Tech Talk on 03-13-2019 07:57 AM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; The thought of Quantum computing advances and Quantum computers being freely&lt;BR /&gt;&amp;gt; available will make our current cryptographic systems redundant.&lt;BR /&gt;&lt;BR /&gt;[Sigh.]&lt;BR /&gt;&lt;BR /&gt;I've been studying the security implications of quantum computing for more than a dozen years, now. We are not quite at quantumpocalypse yet.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; PKI will expire&lt;BR /&gt;&amp;gt; soon.&lt;BR /&gt;&lt;BR /&gt;First, it's only asymmetric crypto that is under any threat. In fact, the Shor algorithm only works against RSA, so DH and ECC are still reasonably safe. In fact, even if all those *are* attackable (which is probably likely, in the long term) we can still go back to symmetric and Kerberos.&lt;BR /&gt;&lt;BR /&gt;Second, it's taking a while to get full-scale quantum computers online. The largest quantum processor is only around 200 qubits, and it's not a full quantum computer so it doesn't run the Shor algorithm. The largest full-scale quantum computer is currently only about 50 qubits. We are going to need a full-scale machine of around 2,000 qubits to seriously attack current asymmetric systems. I'd estimate that is at least 5 years away. And, even then, you could make asymmetric keys bigger. (Meaning you'd need larger quantum computers.)&lt;BR /&gt;&lt;BR /&gt;Third, please don't confuse the existing "quantum cryptography" with using quantum computers to crack crypto. Quantum cryptography isn't crypto at all: it's just key exchange.&lt;BR /&gt;&lt;A href="https://www.welivesecurity.com/2014/01/24/rob-slade-the-truth-about-quantum-cryptography-and-what-it-means-for-privacy/" target="_blank" rel="noopener"&gt;https://www.welivesecurity.com/2014/01/24/rob-slade-the-truth-about-quantum-&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.welivesecurity.com/2014/01/24/rob-slade-the-truth-about-quantum-cryptography-and-what-it-means-for-privacy/" target="_blank" rel="noopener"&gt;cryptography-and-what-it-means-for-privacy/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp;Are there new algorithms being developed and also what is the approach.&lt;BR /&gt;&lt;BR /&gt;Yes, new algorithms are being researched and developed all the time, and a particular field of interest right now is quantum-proof crypto. The approach is to learn about cryptography. Seriously.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Is the NSA doing something about this?&lt;BR /&gt;&lt;BR /&gt;Yes.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Is it something on your Organisation's&lt;BR /&gt;&amp;gt; radar today ?&lt;BR /&gt;&lt;BR /&gt;Actually, quantum computing will have much more serious effects on a number of areas of security besides crypto, and it might not even be the most important ...&lt;BR /&gt;&lt;A href="http://itsecurity.co.uk/2016/09/security-implications-quantum-computing/" target="_blank" rel="noopener"&gt;http://itsecurity.co.uk/2016/09/security-implications-quantum-computing/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;Three things in human life are important. The first is to be&lt;BR /&gt;kind. The second is to be kind. And the third is to be kind.&lt;BR /&gt;- Henry James&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank" rel="noopener"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank" rel="noopener"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank" rel="noopener"&gt;https://is.gd/RotlWB&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 18:52:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20056#M974</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-03-13T18:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20070#M975</link>
      <description>&lt;P&gt;Good points&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;. Progress is being made on the hardware and we need more qubits to reduce the error rate. We also need to get more Comp Sci students pairing their degrees with Electrical Engineering and Physics so that they understand the technology that they are programming - think STEM but on steroids. Awesome programmers in any of the quantum languages (e.g. QCL, Q#,&amp;nbsp;LIQUi|&amp;gt; is going to be essential because someone is going to have to program Shor's discovery and Grover's algorithm. We need people that understand the the emerging software architecture for quantum. Here's an example&amp;nbsp;&lt;A href="https://www.dwavesys.com/software&amp;nbsp;" target="_blank"&gt;https://www.dwavesys.com/software&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 20:43:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20070#M975</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-03-13T20:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20077#M976</link>
      <description>&amp;gt; AppDefects (Newcomer I) mentioned you in a post! Join the conversation below:&lt;BR /&gt;&lt;BR /&gt;&amp;gt; We also need to get more Comp Sci&lt;BR /&gt;&amp;gt; students pairing their degrees with Electrical Engineering and Physics so&lt;BR /&gt;&amp;gt; that they understand the technology that they are programming&lt;BR /&gt;&lt;BR /&gt;There is that ...&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Awesome programmers in any of the quantum languages (e.g.&lt;BR /&gt;&amp;gt; QCL, Q#,Â&amp;nbsp;LIQUi|&amp;gt; is going to be essential because someone is going to have&lt;BR /&gt;&amp;gt; to program Shor's discovery and Grover's algorithm.&lt;BR /&gt;&lt;BR /&gt;Yup. It's going to be very different even from the concepts that current&lt;BR /&gt;programmers have.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; We need people that&lt;BR /&gt;&amp;gt; understand the the emerging software architecture for quantum.&lt;BR /&gt;&lt;BR /&gt;Indeed.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Here's an&lt;BR /&gt;&amp;gt; example&amp;nbsp;&lt;A href="https://www.dwavesys.com/software" target="_blank"&gt;https://www.dwavesys.com/software&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Just a handful of miles from here &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;I am patient with stupidity but not with those who are proud of&lt;BR /&gt;it. - Edith Sitwell&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Thu, 14 Mar 2019 01:00:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20077#M976</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-03-14T01:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20115#M984</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, look for Quantum-Cloud-Computing as-a-service to take off. Today, you can get time on IBM Q, D-Wave, Forest, and even with Microsoft Azure integration.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;And, apparently, &lt;A href="https://spectrum.ieee.org/tech-talk/semiconductors/design/google-team-builds-circuit-to-solve-one-of-quantum-computings-biggest-problems" target="_blank" rel="noopener"&gt;Google&lt;/A&gt; ...&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 15:32:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20115#M984</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-03-14T15:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20194#M998</link>
      <description>&lt;P&gt;I suggest we should look beyond Quantum Cryptography, to Post Quantum Cryptography and beyond:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.research.ibm.com/5-in-5/lattice-cryptography/" target="_blank" rel="noopener"&gt;https://www.research.ibm.com/5-in-5/lattice-cryptography/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Things are moving so fast, we need to deal with the speed of light developments going on in order to combat the ongoing onslaught, which bound to keep a whole bunch of us safely employed for many a year - well beyond are expected retirement ages.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Lattice-based cryptography isn’t only for thwarting future quantum computers. It is also the basis of another encryption technology called Fully Homomorphic Encryption (FHE). FHE could make it possible to perform calculations on a file without ever seeing sensitive data or exposing it to hackers."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Quantum Computing will enable us to fully enable FHE - it is a stepping stone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is huge sums available for research purposes in this field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2019 05:52:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20194#M998</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-03-17T05:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20357#M1018</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;Quantum Computing will enable us to fully enable FHE - it is a stepping stone.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hopefully a day will come when we can all realize &lt;A href="https://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf" target="_blank" rel="noopener"&gt;Craig Gentry's&lt;/A&gt; work on FHE using ideas lattices...&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 18:25:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/20357#M1018</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-03-21T18:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/21739#M1208</link>
      <description>&lt;P&gt;I'd like to amend to that, the NIST Quantum crytpo competition is currently in its second round: &lt;A href="https://csrc.nist.gov/Projects/Post-Quantum-Cryptography" target="_blank"&gt;https://csrc.nist.gov/Projects/Post-Quantum-Cryptography&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other questions around the topic, alike how to deal with it in a professional environment, feel free to contact me. (Not for setting up quantum safe PKI's though)&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2019 08:45:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/21739#M1208</guid>
      <dc:creator>Kerling</dc:creator>
      <dc:date>2019-05-01T08:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/30647#M2004</link>
      <description>&lt;P&gt;Both an amusing take on the controversy and a resource for ongoing "news" is the "Quantum Bullshirt Detector" Twitter account (which the dreaded "community pr0n filter will not let me post, but which you can search for if you correct the "shirt") ...&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 19:14:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/30647#M2004</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-12-13T19:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/43415#M3159</link>
      <description>&lt;P&gt;Hi, fresh here so apologies for any mistakes by me!&amp;nbsp; A question about RSA, strenghth&amp;nbsp; and quantum computing (qubits), I have heard&amp;nbsp; in conferences and lectures over the past years quite different stories on how many qubits it takes to actually break RSA cryptography, a range from "a few" to "several hundreds", I guess this also depends on the quality of the qubits and their entanglement, but does anyone have a good estimate?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 14:50:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/43415#M3159</guid>
      <dc:creator>FredrickB</dc:creator>
      <dc:date>2021-02-18T14:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/43426#M3160</link>
      <description>&amp;gt; FredrickB (Viewer) posted a new reply in Tech Talk on 02-18-2021 09:50 AM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Hi, fresh here so apologies for any mistakes by me!&amp;nbsp; A question about RSA,&lt;BR /&gt;&amp;gt; strenghth&amp;nbsp; and quantum computing (qubits), I have heard&amp;nbsp; in conferences and&lt;BR /&gt;&amp;gt; lectures over the past years quite different stories on how many qubits it takes&lt;BR /&gt;&amp;gt; to actually break RSA cryptography, a range from "a few" to "several hundreds",&lt;BR /&gt;&amp;gt; I guess this also depends on the quality of the qubits and their entanglement,&lt;BR /&gt;&amp;gt; but does anyone have a good estimate?&lt;BR /&gt;&lt;BR /&gt;Using the Shor algorithm you need twice as many qubits as the length of the key.&lt;BR /&gt;So, to break a 4,000 bit key, you need a machine with 8,000 qubits.&lt;BR /&gt;&lt;BR /&gt;Since, except for D-Wave, we are only barely into double digits on most quantum&lt;BR /&gt;computers, we have some ways to go. (D-Wave doesn't count, since it is best&lt;BR /&gt;described as a quantum co-processor, rather than a full-fledged quantum computer.&lt;BR /&gt;Specifically, it cannot run the Shor algorithm.)&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Thu, 18 Feb 2021 19:14:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/43426#M3160</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-02-18T19:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/66673#M4261</link>
      <description>&lt;P&gt;Nist is at final stage to define PQC&amp;nbsp;Algorithm&lt;/P&gt;&lt;P&gt;&lt;A href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank" rel="noopener"&gt;@https://csrc.nist.gov/projects/post-quantum-cryptography&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only big problem is .. htat those will be good untill someone else will find Qauntum Algorithms to break them.&lt;BR /&gt;The best way is start to consider the Crypto Agility as a must.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2024 15:30:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/66673#M4261</guid>
      <dc:creator>waltzie</dc:creator>
      <dc:date>2024-01-28T15:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: PKI and Quantum Computing</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/66713#M4264</link>
      <description>&lt;P&gt;HI &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main issue is having sufficient Quantum Memory which is stable enough to accommodate the Quantum Cryptography algorithms in order to break the RSA keys, there have been some exaggerations from various sources, which under scrutiny fail.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We may reach that level in 2026 or up to 2031 - the race is on at the present time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although the State Actors are actively working underground to achieve this pouring vast sums into the research and technologies required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 20:29:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PKI-and-Quantum-Computing/m-p/66713#M4264</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-01-29T20:29:06Z</dc:date>
    </item>
  </channel>
</rss>

