v2 Quantum_Safe_Cryptography_Presentation.pptx

dyhodcse 1 views 14 slides Sep 17, 2025
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

Quantum


Slide Content

Quantum-Safe Cryptography & Cybersecurity Challenges Presentation by: Shah Mohammed Aliuddin Chief Technology Officer eWAY Innovations & Automations Co.

2 Contents o1. Introduction to Quantum Computing o3. Threats Posed by Quantum Computing o4. Quantum-Safe Cryptography (Post-Quantum Cryptography) o5. Cybersecurity Challenges in Transition o2. Current Cryptographic Landscape o6. Industry Adoption & Standards (NIST, ETSI) o7. Case Studies & Real-World Implications o8. Roadmap for Organizations o9. Q & A

Introduction to Quantum Computing We will cover these Based on qubits, superposition, entanglement Exponentially faster for certain problems Potential Impact: AI, materials science, healthcare Threatens classical cryptography

The Current Cryptographic Landscape • Public-Key Cryptography RSA, ECC → Internet, Banking, Communications • Symmetric Cryptography AES, DES → Data encryption, VPNs, Cloud • Hashing SHA-2, SHA-3 → Integrity & Authentication 4

The Quantum Threat • Shor’s Algorithm: Breaks RSA & ECC • Grover’s Algorithm: Weakens symmetric encryption • Quantum computers with thousands of qubits → 10–15 years • Harvest Now, Decrypt Later threat 5

Why We Need Quantum-Safe Cryptography? Existing cryptography vulnerable Long-term confidentiality risk: Medical, financial, defense data Mission-critical systems → decades of protection 6 Regulatory & compliance mandates emerging

Quantum-Safe Cryptography (PQC) Algorithms designed to resist quantum attacks 1. Lattice-based (CRYSTALS-Kyber, Dilithium) 2. Code-based (Classic McEliece) 3. Multivariate polynomial-based 4. Hash-based (XMSS, SPHINCS+) NIST PQC Standardization → Draft standards in 2024/25 7 Approaches

Cybersecurity Challenges: in Transition • Performance Overheads: Higher computation & bandwidth • Interoperability with legacy systems, IoT, cloud • Standardization Gaps across industries • Key Management Complexity: Larger keys/signatures • Awareness & Skills shortage 8

Industry Adoption & Standards NIST PQC Project (Final algorithms expected 2025) ETSI Quantum-Safe Cryptography Working Group ISO, IETF, Cloud Security Alliance → Standards Industry Pilots - Google → Hybrid PQC in Chrome - Microsoft → PQC integration in TLS - Telecoms & Banks pilots

Case Studies & Implications o1. Financial Services: Long-term sensitive transactions o2. Healthcare: Patient data privacy for decades o3. Government & Defense: Classified data beyond 2050 o4. Telecom & IoT: Billions of devices need updates 10

Roadmap for Organizations o1. Inventory & Assess cryptographic systems o2. Risk Prioritization (long-lifetime data) o3. Hybrid Approaches (classical + PQC) o4. Pilot PQC Implementations 11 o5. Workforce Training & Awareness o6. Regulatory Alignment

Academic & Research Opportunities Algorithm design and cryptanalysis PQC for constrained devices (IoT, mobile) QKD integration with PQC Simulation of post-quantum attack vectors Policy & governance for crypto migration 12

Key Takeaways Quantum computing = both opportunity & threat Classical cryptography at risk PQC urgent for research & adoption Transition challenges: performance, interoperability, awareness Students & researchers → shape secure future 13

Thank you email: [email protected] Phone: +91 79 936 23 936
Tags