Meeting Information

Cryptography in a Post-Quantum World

May 20, 2020
Virtual Talk

Date: Wednesday, May 20, 2020
Speaker: Dr. Dustin Moody, Computer Security Division, National Institute of Standards and Technology
Title: Cryptography in a Post-Quantum World
Time and Location: 12:00 PM Eastern Time (US and Canada), Virtual Talk (Zoom)

Join Zoom Meeting
https://apsphysics.zoom.us/j/91581086696?pwd=VDhlRi9YUlFMazZoVXNRTXlFWGpNUT09

Meeting ID: 915 8108 6696
Password: 553490
One tap mobile
+13017158592,,91581086696# US (Germantown)
+13126266799,,91581086696# US (Chicago)

Dial by your location
+1 301 715 8592 US (Germantown)
+1 312 626 6799 US (Chicago)
+1 929 436 2866 US (New York)
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)

Meeting ID: 915 8108 6696
Find your local number.

Abstract: For the past few decades, researchers have been working on building a quantum computer.  Quantum computers are fundamentally different than today’s classical computers, and operate using principles of quantum physics.  A large-scale quantum computer would be able to break all widely-deployed public-key crypto systems in use  today.  In 2016, the National Institute of Standards and Technology (NIST) announced a worldwide call for quantum-resistant public-key cryptographic algorithms to replace the ones that would be broken.  In response, NIST received over 80 submissions to be considered for standardization.  Currently, 26 of those algorithms are still under consideration and are being assessed in regards to their security and performance.  In this talk, Dr. Dustin Moody will survey the field of “post-quantum cryptography”, and discuss what NIST is doing to make sure we’re ready.

Bio: Dr. Dustin Moody is a mathematician in the Computer Security Division of the National Institute of Standards and Technology. Dr. Moody leads the Post-Quantum Cryptography project at NIST.  He received his Ph.D. from the University of Washington in 2009.  His area of research deals with elliptic curves, and their applications in cryptography.