There’s a clock ticking down to the moment when quantum computers are powerful enough to break the encryption that enables security, trust, and privacy online.
We don’t know when it will hit zero. But we do know what will happen when it does.
Prof. Peter Shor
Emilia Kasper
Dr. Taher Elgamal
Dr. Bob Sutor
As we commemorate the 30th anniversary of Shor’s Algorithm, Amit Sinha conducts a fireside chat with Professor Peter Shor himself for a few words on getting ready for a post-quantum world.
Are quantum fears unfounded, or is the sky falling?
What does “quantum readiness†really mean—and can you realistically achieve it in time.
Industry leaders evaluate the latest PQC technologies, tactics, and best practices.
Dr.Taher Elgamal and Amit Sinha join John Furrier of the CUBE for a brief conversation about the current state of adoption of quantum-safe cryptographic methods.
The first annual Quantum Readiness Award winner is revealed. Ìý
Key takeaways, next steps, and ways to get involved. Ìý
¶ºÒõ¹Ý created World Quantum Readiness Day to call global attention to the need to build and implement effective protections against quantum threats—and celebrate organizations that are leading the charge.
It’s not hyperbole to say that functional quantum computing presents an extinction-level threat to standard encryption—the literal foundation of digital security. And yet our 2024 State of Digital Trust Report found that a majority of even security-focused organizations say they aren’t ready.
Most enterprises report being unprepared for the threat posed by quantum computing.
Globally, it is estimated that about 402,000 petabytes (PB) of data are created every day. Almost all of it is encrypted using standard RSA and ECC algorithms.
Shor’s algorithm, the theoretical foundation for using quantum machines to crack RSA and other non-quantum encryption protocols, turns 30 years old in 2024.