Saturday, November 13, 2021
Strong encryption does not guarantee strong security.
Hackers are lazy. After all, why dedicate thousands of hours decrypting messages when you can exploit an outdated service, steal a secret key, and bypass encryption altogether?
This talk explores the life cycle of an encryption service, and how the stages, and the links between them, can be exploited.
To satisfy the mathematical requirements of a post-quantum world, academics are developing more and more advanced encryption methods (a hesitant shout-out here to elliptic curve and post-quantum Cryptography – which I still don’t understand despite years of study). But this increasing complexity introduces as many drawbacks as benefits.
The technical world may seem to complex for any of us to fully understand - and that’s okay, it doesn’t mean we’re doomed.
Download these images to your phone and post using the Instagram app.