Post Quantum Safe World: כך תתגוננו מפני מתקפה קוואנטית
On the day quantum computers become a reality, hackers will be able to decrypt all encrypted communication collected over the years. This includes any sensitive data you can imagine – from transaction details and credit card numbers to personal customer information. Companies that do not align with the new standards and the solutions that are starting to roll out are endangering themselves and their customers on a scale whose severity is hard to grasp.
The new security defenses and solutions, and those yet to come, are relevant to the entire development community and break the boundaries of the cryptography world. In fact, every developer, security and DevOps professional, and even product managers who want to work closely with the new information security standards, need to start getting to know them.
A new meetup by Geektime and Starkware wants to make all this information accessible to the Israeli development community. It will be dedicated to the possible attacks on known encryptions using a quantum computer, and will review the possible defense methods, the leading one being the use of a proof called STARK.
