When Quantum and IoT Collide: Rooting Trust in a Quantum World

Presented by

Mike Brown, CTO & Co-founder, ISARA Corporation

About this talk

As the number of IoT devices increases, so do security concerns. To combat this issue, many different security approaches are used. A strong option for high-end applications, such as connected cars, utility metering, and medical devices, is to embed a hardware root of trust underpinned by public key cryptography. However, the onset of large-scale quantum computing - estimated within seven to ten years - will break current public key cryptography rendering hardware roots of trust vulnerable to attack. Why is this an issue for today? High-end devices in development and production today will be in-field for several years. Recalling every device to upgrade the hardware roots of trust will be financially and logistically challenging, resulting in significant risk and widespread vulnerabilities. Join us for a practical and informative webinar covering the following topics: - A brief overview of quantum computing and it’s effect on current public key cryptography – no PhD required! - Why focusing on the exact date a large-scale quantum computer will exist is a recipe for failure, instead Mike presents a practical planning approach to reduce complexity - Understanding the unique challenge quantum presents to durable IoT devices - Why it’s critical to take action today to avoid costly, logistically challenging recalls in the future - Exploring quantum-safe solutions available today, specifically quantum-safe signature options and their implementation on HSMs

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (8)
Subscribers (405)
ISARA Corporation is the world’s leading provider of agile, quantum-safe security solutions. On our channel, we focus on providing security professionals with practical, educational content about quantum computing and its threat to cybersecurity, global standards progress, quantum-safe market updates, unique insights and new (agile) approaches to cryptography.