
HN796: The Why and How of Making Your Infrastructure Quantum-Safe (Sponsored)
The Everything Feed - All Packet Pushers Pods
00:00
Navigating the Quantum Cryptography Shift
This chapter explores the vulnerabilities of current cryptographic systems to quantum computing, particularly focusing on RSA encryption and Shor's algorithm. It emphasizes the urgent need for a transition to quantum-safe alternatives as quantum technologies advance, detailing the timeline and strategies outlined by organizations like NIST for adopting post-quantum cryptography. The discussion highlights the potential risks to internet security and the importance of incorporating both classical and new cryptographic solutions during this pivotal transition.
Play episode from 01:44
Transcript


