Overview
Learn how to secure software supply chains against quantum computing threats in this 26-minute conference talk from Red Hat engineers. Explore the critical vulnerabilities in current cryptographic systems and discover a practical approach to transform quantum-vulnerable stacks into quantum-resistant ones using Tekton, an open-source CI/CD framework, as a case study. Dive into quantum computing threats to existing cryptographic algorithms, methods for identifying quantum vulnerabilities in Tekton, and understand Post Quantum Cryptographic (PQC) algorithms. Master NIST standards and guidelines for PQC migration, including the importance of hybrid approaches that combine classical quantum-resistant and new quantum signing algorithms during transition periods. Walk through a detailed reference implementation of making Tekton quantum-safe, gaining valuable insights into quantum vulnerabilities, PQC implementation, and reliable transition strategies for achieving quantum-safe states in software systems.
Syllabus
Towards a Quantum Proof Software Supply Chain with Post Quant... - Anitha Natarajan & Savita Ashture
Taught by
OpenSSF