{"guid":"09e72f05-7abc-5d7e-9cab-fede3621e805","title":"Post-Quantum Cryptography: Detours, delays, and disasters","subtitle":"","slug":"fire-shonks-2022-49246-post-quantum-cryptography-detours-delays-and-disasters","link":"https://pretalx.c3voc.de/fire-shonks-2022/talk/B7GMAL/","description":"Post-quantum cryptography is an important branch of cryptography, studying cryptography under the threat model that the attacker has a quantum computer. Systems that can withstand quantum attacks are urgently needed but in many applications all parties need to agree on what system is used. NIST, the US National Institute for Standards and Technology, has been running a competition to select some systems as standards. This talk will report on the process and cover some of the interesting ways that the design, standardization, and deployment of post-quantum cryptography have been going wrong.\r\n\r\n\r\nWhy do we still not use post-quantum cryptography? This talk sheds some light on what happened beyond the efforts of researchers to design good crypto and get it deployed. Bring your tinfoil hats.","original_language":"eng","persons":["D. J. Bernstein","Tanja Lange"],"tags":["jev22-fireshonks","49246","2022","R3S - Remote Rhein Ruhr Stage","FireShonks"],"view_count":1396,"promoted":false,"date":"2022-12-29T20:00:00.000+01:00","release_date":"2022-12-30T00:00:00.000+01:00","updated_at":"2026-02-08T08:15:05.426+01:00","length":2416,"duration":2416,"thumb_url":"https://static.media.ccc.de/media/events/jev22/49246-09e72f05-7abc-5d7e-9cab-fede3621e805.jpg","poster_url":"https://static.media.ccc.de/media/events/jev22/49246-09e72f05-7abc-5d7e-9cab-fede3621e805_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/jev22/49246-09e72f05-7abc-5d7e-9cab-fede3621e805.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/jev22/49246-09e72f05-7abc-5d7e-9cab-fede3621e805.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/fire-shonks-2022-49246-post-quantum-cryptography-detours-delays-and-disasters","url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_title":"Dezentrale Jahresendveranstaltungen","conference_url":"https://api.media.ccc.de/public/conferences/jev22","related":[],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"ukr","filename":"jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.uk.srt","state":"translated","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2025-05-14T12:26:01.731+02:00","recording_url":"https://cdn.media.ccc.de/events/jev22/jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.uk.srt","url":"https://api.media.ccc.de/public/recordings/87570","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":25,"length":2416,"mime_type":"audio/opus","language":"deu","filename":"jev22-fireshonks-49246-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_opus-2.opus","state":"new","folder":"opus-translation","high_quality":false,"width":0,"height":0,"updated_at":"2022-12-31T14:59:03.589+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/opus-translation/jev22-fireshonks-49246-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_opus-2.opus","url":"https://api.media.ccc.de/public/recordings/63934","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":36,"length":2416,"mime_type":"audio/mpeg","language":"deu","filename":"jev22-fireshonks-49246-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_mp3-2.mp3","state":"new","folder":"mp3-translated","high_quality":false,"width":0,"height":0,"updated_at":"2022-12-31T14:58:46.462+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/mp3-translated/jev22-fireshonks-49246-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_mp3-2.mp3","url":"https://api.media.ccc.de/public/recordings/63933","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2024-02-12T21:40:06.136+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/DRAFT_jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/75109","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"fin","filename":"jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.fi.srt","state":"translated","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2024-02-11T21:37:04.279+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.fi.srt","url":"https://api.media.ccc.de/public/recordings/75110","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":123,"length":2416,"mime_type":"video/webm","language":"eng-deu","filename":"jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-12-30T21:56:10.283+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/webm-sd/jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/63860","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":237,"length":2416,"mime_type":"video/webm","language":"eng-deu","filename":"jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-12-30T21:55:57.538+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/webm-hd/jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/63859","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":27,"length":2416,"mime_type":"audio/opus","language":"eng","filename":"jev22-fireshonks-49246-eng-Post-Quantum_Cryptography_Detours_delays_and_disasters_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2022-12-30T21:53:30.926+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/opus/jev22-fireshonks-49246-eng-Post-Quantum_Cryptography_Detours_delays_and_disasters_opus.opus","url":"https://api.media.ccc.de/public/recordings/63858","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":36,"length":2416,"mime_type":"audio/mpeg","language":"eng","filename":"jev22-fireshonks-49246-eng-Post-Quantum_Cryptography_Detours_delays_and_disasters_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2022-12-30T21:52:24.403+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/mp3/jev22-fireshonks-49246-eng-Post-Quantum_Cryptography_Detours_delays_and_disasters_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/63857","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":100,"length":2416,"mime_type":"video/mp4","language":"eng-deu","filename":"jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-12-30T19:21:06.329+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/h264-sd/jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_sd.mp4","url":"https://api.media.ccc.de/public/recordings/63764","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":170,"length":2416,"mime_type":"video/mp4","language":"eng-deu","filename":"jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-12-30T19:13:28.675+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/h264-hd/jev22-fireshonks-49246-eng-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters_hd.mp4","url":"https://api.media.ccc.de/public/recordings/63753","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":132,"length":2416,"mime_type":"video/mp4","language":"deu","filename":"jev22-fireshonks-49246-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-12-30T19:13:23.163+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/h264-hd/jev22-fireshonks-49246-deu-Post-Quantum_Cryptography_Detours_delays_and_disasters.mp4","url":"https://api.media.ccc.de/public/recordings/63752","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"},{"size":132,"length":2416,"mime_type":"video/mp4","language":"eng","filename":"jev22-fireshonks-49246-eng-Post-Quantum_Cryptography_Detours_delays_and_disasters.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-12-30T19:13:17.898+01:00","recording_url":"https://cdn.media.ccc.de/events/jev22/h264-hd/jev22-fireshonks-49246-eng-Post-Quantum_Cryptography_Detours_delays_and_disasters.mp4","url":"https://api.media.ccc.de/public/recordings/63751","event_url":"https://api.media.ccc.de/public/events/09e72f05-7abc-5d7e-9cab-fede3621e805","conference_url":"https://api.media.ccc.de/public/conferences/jev22"}]}