Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Towards a Quantum Proof Software Supply Chain with Post Quantum Cryptographic Algorithms

OpenSSF via YouTube

Overview

Learn how to secure software supply chains against quantum computing threats in this 26-minute conference talk from Red Hat engineers. Explore the critical vulnerabilities in current cryptographic systems and discover a practical approach to transform quantum-vulnerable stacks into quantum-resistant ones using Tekton, an open-source CI/CD framework, as a case study. Dive into quantum computing threats to existing cryptographic algorithms, methods for identifying quantum vulnerabilities in Tekton, and understand Post Quantum Cryptographic (PQC) algorithms. Master NIST standards and guidelines for PQC migration, including the importance of hybrid approaches that combine classical quantum-resistant and new quantum signing algorithms during transition periods. Walk through a detailed reference implementation of making Tekton quantum-safe, gaining valuable insights into quantum vulnerabilities, PQC implementation, and reliable transition strategies for achieving quantum-safe states in software systems.

Syllabus

Towards a Quantum Proof Software Supply Chain with Post Quant... - Anitha Natarajan & Savita Ashture

Taught by

OpenSSF

Reviews

Start your review of Towards a Quantum Proof Software Supply Chain with Post Quantum Cryptographic Algorithms

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.