Quantum and Post-Quantum Crypto by Les Bell

A high-level overview of quantum cryptology, covering basic quantum mechanics, quantum computing, quantum cryptography (quantum key distribution), quantum cryptanalysis (Shor’s algorithm and Grover’s algorithm), post-quantum cryptography and cryptographic agility.

Table of Contents:

00:00 - Introduction

00:31 - Outline

01:05 - Quantum Mechanics

13:13 - Quantum Computing

15:32 - “The Talk”

17:09 - Quantum Key Distribution

23:45 - Observation of Photons

27:19 - BB84 Quantum Key Distribution

30:29 - BB84 Reconciliation Stage

32:41 - Reconciliation Example

34:43 - Privacy Amplification

37:06 - Shor’s Algorithm

42:14 - The Quantum Circuit

43:04 - An Example of Shor’s Algorithm

43:22 - Presentation Paused

43:36 - Presentation Resumed

44:35 - An Example of Shor’s Algorithm

46:20 - Grover’s Algorithm

48:54 - Conclusions

51:14 - Post-Quantum Crypto

52:52 - NTRU

54:45 - McEliece Cryptosystem

56:58 - Google Trials

58:46 - Cryptographic Agility

1:01:53 - NSA CNSAS

1:04:35 - References and Further Reading