From the vantage point of a cybersecurity, PKI, and cryptography engineer, quantum cryptanalysis is not just a theoretical risk—it’s a practical and urgent concern. As someone deeply embedded in the architecture of secure communications, I recognize how quantum computing threatens to upend foundational encryption protocols like RSA, ECC, and even symmetric systems like AES. Quantum algorithms, particularly Shor’s and Grover’s, introduce attack vectors that significantly lower the effort required to decrypt sensitive data, posing existential challenges to public key infrastructure (PKI) and data confidentiality.
This technical session provides an engineer’s insight into the multifaceted risks quantum computing introduces to cryptographic systems, focusing on:
• The breakdown of traditional PKI structures under quantum pressure
• Evaluating the robustness of Post-Quantum Cryptography (PQC) for future-proofing applications
• Exploring the potential of Quantum Key Distribution (QKD) for unconditional security
• Implementing hybrid encryption frameworks to bridge classical systems with post-quantum protections
Participants will gain a deeper understanding of quantum cryptanalysis through a security practitioner’s lens, allowing them to better assess risk, redesign infrastructure, and implement adaptive countermeasures in preparation for the quantum era.
Key takeaways:
You will walk away with:
• Basics of Quantum Computing
• Basics of Cryptography
• Where can / will we use Quantum Computing, and where not to use
• Impact and Prevention on Cryptography
• Post-Quantum Computing (PQC)
• What can Quantum Computing do within Cybersecurity?
• Basics about Shor’s and Grover’s algorithms
• Threats & Security Impacts of Quantum Computing
• Password Hacking & Quantum Computing
• Facts & Myths about Quantum Computing
• Impacts of Quantum Attacks on Current Encryption
• In 4 easy steps to prepare us for Quantum Computing
• Key takeaways