|How Quantum Computers Work with a Step-by-Step Defeating Encryption Case Study Walk Through
Sponsored By: TeleStrategies' ISS WorldŽ
February 22, 2018 : Online Webinar
TIME: 9:00-10:00 AM New York Time, Eastern USA Time
Free for Law Enforcement, the government intelligence community and private enterprise cyber security managers. Registration with Government or Corporate e-mail address is required.
Click Here To Register
How Quantum Computers Work with a Step-by-Step Defeating Encryption Case Study Walk Through
Countless news articles have been written about quantum computers, the magic of Entangled Qubits and all the new business opportunities that will be created with these general-purpose machines. But what is not addressed in these articles is you don’t need a general purpose quantum computer to defeat today’s cryptography. While these general-purpose machines are likely a decade away from deployment, an application specific quantum computer designed for one purpose only, e.g. defeating today’s public key encryption is but a few years away.
This webinar is for cyber security executives and specialists who have the responsibility of assessing the lead time they have before deploying quantum safe cryptography solutions. If you believe nation state security agencies are developing quantum computers to decrypt your past and future intercepted transmission sessions, this webinar should be a must attend briefing.
Meantime in order to make this lead time assessment for quantum safe cryptography deployment you need to track performance metrics of key components of quantum computer technology. And to do this you need to understand how a quantum computer works when applied only to defeating public key encryption.
This webinar addresses:
All Contents Copyright © 2018