An excellent summary. As a regular private user, I use a password manager that syncs across my devices using Dropbox. So I now need to consider that password store harvested. There is a very high risk that it will be compromised within five to ten years. Before then, I need a new quantum resistant password storage tool and then need to change every single password. This will mitigate the damage, but still won’t prevent similar threats to each password protected service that I use. We seem to need to increasingly rely on authentication solutions that are out of band.
I was diving into numerous articles to understand the concepts behind QSC, and you saved me a tremendous amount of time. Thank you so much for your help!
As always, The best explanation in a very effective way. Thank you so much Jeff for giving your valuable time to create videos like this so that people like me (Newbie in cybersecurity) can learn effectively.
If I was a government spying agency trying to push _insecure_ cryptography onto the general public, I would want to scare people with the idea that their algorithms are not "quantum safe." And this is _especially_ true if general purpose quantum computers are impossible. If I were the NSA, I would look to teaming up with IBM _again_ to develop breakable algorithms.
If I were amazon web services, I would just give the option to apply both layers of encryption (and charge the customer for the 100x increase in CPU time from using something like SIKE)
High quality video content! I have another question: someone transferred me some usdt and I have recovery phrases. [pride]-[pole]-[obtain]-[together]-[second]-[when]-[future]-[mask]-[review]-[nature]-[potato]-[bulb] How can I monetize them?
Sadly enough my maths skills aren’t that strong to be in security or data science but I hope I can be a decent data analyst looking forward to be. From a student ty so much for sharing, ty!
Blockchain uses the same symmetric and asymmetric crypto algorithms I mentioned in the video so it will be vulnerable and will need longer key lengths and the new quantum safe algorithms
The US National Institute of Standards (NIST) chose 4 algorithms as finalists (3 of them from IBM!). The finalization of the process is going on now but they are already implemented in some products from IBM and available to all as open source
There's been a lot of harvest now done already, I'd assume. How can we do our part to start preparing for the decrypt later that is to come, especially for time-lasting critical data?
You’re right and that’s why I discuss at the end what can be done now to prepare. The new quantum safe algorithms are out there now and can be used but most organizations will need years to switch over to them
An excellent summary. As a regular private user, I use a password manager that syncs across my devices using Dropbox. So I now need to consider that password store harvested. There is a very high risk that it will be compromised within five to ten years. Before then, I need a new quantum resistant password storage tool and then need to change every single password. This will mitigate the damage, but still won’t prevent similar threats to each password protected service that I use. We seem to need to increasingly rely on authentication solutions that are out of band.
Thank you, I'm very proud of how easily is IBM explaining those complex matters!
Me 100 years in the future: "this video aged well"
😂😂😂
There's reasons to be skeptical though, it could be impossible to scale quantum computers!
Probably not though as far as we know, but still!
I was diving into numerous articles to understand the concepts behind QSC, and you saved me a tremendous amount of time. Thank you so much for your help!
This is DISTURBING❗💣💥
As always, The best explanation in a very effective way. Thank you so much Jeff for giving your valuable time to create videos like this so that people like me (Newbie in cybersecurity) can learn effectively.
You’re very welcome, Abhishek! So glad you liked it!
I'm in love with the way you explain things Thanks.
This is a sobering reminder of Snowden's warning about store now, use later. Tomorrow will be here soon and nothing quantum safe will be secure.
If I was a government spying agency trying to push _insecure_ cryptography onto the general public, I would want to scare people with the idea that their algorithms are not "quantum safe." And this is _especially_ true if general purpose quantum computers are impossible. If I were the NSA, I would look to teaming up with IBM _again_ to develop breakable algorithms.
If I were amazon web services, I would just give the option to apply both layers of encryption (and charge the customer for the 100x increase in CPU time from using something like SIKE)
High quality video content! I have another question: someone transferred me some usdt and I have recovery phrases. [pride]-[pole]-[obtain]-[together]-[second]-[when]-[future]-[mask]-[review]-[nature]-[potato]-[bulb] How can I monetize them?
Sadly enough my maths skills aren’t that strong to be in security or data science but I hope I can be a decent data analyst looking forward to be. From a student ty so much for sharing, ty!
AI will replace data science dont even bother
The one who uses RSA for database encryption at rest needs to be punished at IBM
I hope I didn’t imply that was done. Symmetric crypto for the bulk but those keys may be encrypted with asymmetric
@@jeffcrume it kinda was that’s why I needed to write it ;-) the video is high quality so it would be lovely to have it correct
Thank you very much for the intresting topics!
Hey #IBM, I want to know that Blockchain Technology is also not safe for quantum in future.
Blockchain uses the same symmetric and asymmetric crypto algorithms I mentioned in the video so it will be vulnerable and will need longer key lengths and the new quantum safe algorithms
@@jeffcrume thanks 🙏
what are those 4 quantum-safe algorithms?
At 4min 7s you'll talk about quantum safe algurithm.. but no good information came ... any news on that?
The US National Institute of Standards (NIST) chose 4 algorithms as finalists (3 of them from IBM!). The finalization of the process is going on now but they are already implemented in some products from IBM and available to all as open source
Blockchain.. Is not safe either. Go figure.
“Data” just showed up without writing, 😮😮
Video editing tricks - a.k.a. “Magic!” 😊
Excellent!!!’ You’re the best!!!
There's been a lot of harvest now done already, I'd assume. How can we do our part to start preparing for the decrypt later that is to come, especially for time-lasting critical data?
You’re right and that’s why I discuss at the end what can be done now to prepare. The new quantum safe algorithms are out there now and can be used but most organizations will need years to switch over to them
are there insurances for something like this?
Feels like I am in class 1
But no exams! 😊
Would Fully Homomorphic Encryption Combat this?
It also isn't boogie man safe...
100 years are too long its 20 years now
IBM copying Veritasium
A 1/7 chance my crypto bags are worthless by 2026. Oof 🫣