How Quantum Computers Work with a Step-by-Step Defeating Encryption Case Study Walk Through

Sponsored By: TeleStrategies' ISS WorldŽ

February 22, 2018 : Online Webinar

TIME: 9:00-10:00 AM New York Time, Eastern USA Time

Free for Law Enforcement, the government intelligence community and private enterprise cyber security managers. Registration with Government or Corporate e-mail address is required.

Click here to register  Click Here To Register

How Quantum Computers Work with a Step-by-Step Defeating Encryption Case Study Walk Through

Countless news articles have been written about quantum computers, the magic of Entangled Qubits and all the new business opportunities that will be created with these general-purpose machines.  But what is not addressed in these articles is you don’t need a general purpose quantum computer to defeat today’s cryptography.  While these general-purpose machines are likely a decade away from deployment, an application specific quantum computer designed for one purpose only, e.g. defeating today’s public key encryption is but a few years away.

This webinar is for cyber security executives and specialists who have the responsibility of assessing the lead time they have before deploying quantum safe cryptography solutions. If you believe nation state security agencies are developing quantum computers to decrypt your past and future intercepted transmission sessions, this webinar should be a must attend briefing.

Meantime in order to make this lead time assessment for quantum safe cryptography deployment you need to track performance metrics of key components of quantum computer technology.  And to do this you need to understand how a quantum computer works when applied only to defeating public key encryption.  

This webinar addresses:

  1. A one-to-one functional comparison of a general-purpose computers with an application specific quantum computer designed to do but one thing, defeat today's public key encryption.

  2. Why a quantum computer can make todays public key encryptions totally obsolete.

  3. Entangled Qubits, Gates and Qubit Circuits explained (light on physics)

  4. The Encryption Busting, Shor’s Algorithm explained (light on mathematics)

  5. A Step-by-Step walk through of what goes on within a quantum computer processing a small public encryption key as numerical input through the delivery of numerical private key as output (e.g. encryption defeated)

  6. Quantum Computer challenges with decrypting large public keys (e.g. RSA 2048 class) and the performance metrics (number of Entangled Qubits, etc.) cyber security specialists need to be monitoring.

  7. Leading Quantum Computer hardware options supported by IBM, Microsoft & Google vs. defeating encryption only, application specific quantum computer architectures.

  8. Why several thousand, Qubit Annealing Quantum Computers are not today able to successfully run Shor Type (e.g. defeating encryption) algorithms.

  9. Quantum Safe Cryptography Options (QSA & QKD) and deployment readiness challenges.

  10. Webinar Audience Feedback, Comments and/or Questions 

Presented by:
Jerry Lucas (PhD, Physics)
President, TeleStrategies

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2018
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

703-734-7050 fax:703-893-3197