This presentation discusses the future implications of quantum computing on current cryptographic systems, framed through a fictional story set in 2029 about Kai, a full-stack engineer at MOHT. The narrative begins with Kai discovering a suspicious code commit in a mental health app project, which leads into a broader discussion about quantum computing's threat to current cryptographic systems.
Key aspects covered in the presentation:
1. A practical example through Kai's story demonstrating how quantum computing could potentially break multiple layers of security:
- SSH keys
- HTTPS connections
- VPN encryption
- Digital signatures
- E2E encryption
- Cryptocurrency wallets
2. Technical fundamentals:
- Basics of encryption (symmetric vs asymmetric)
- Public Key Cryptography (PKC)
- Integer factorization
- Quantum computing concepts (qubits, superposition)
- Shor's algorithm
3. The "Store Now, Decrypt Later" threat:
- Current data can be stored and decrypted later when quantum computers become powerful enough
- This makes quantum computing a present threat, not just a future one
4. Impact across different sectors:
- Governments and militaries (likely prepared)
- Large companies and banks (working on solutions)
- SMEs (need to stay updated)
- Legacy systems using PKC
- Cryptocurrency ecosystem
5. Solutions through Post-Quantum Cryptography:
- NIST PQC Algorithm competition winners
- CRYSTALS-Kyber for general encryption
- CRYSTALS-Dilithium, FALCON, and SPHINCS+ for digital signatures
6. Actionable recommendations for different roles:
- General users (minimal action needed)
- Frontend developers (5-year horizon)
- Backend/DevOps (4-5 year horizon)
- Security professionals (immediate action required)
- Cryptocurrency users (need to stay informed about exchanges/chains implementing quantum-resistant solutions)
Related topics: