У нас вы можете посмотреть бесплатно HNDL, KyberSlash, & The $7B Compliance Theater: A PQC Analysis или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Is the global rush to Post-Quantum Cryptography (PQC) a necessary defense against a "Quantum Apocalypse," or is it a dangerous case of "Compliance Theater"? In this video, we apply a skeptical researcher’s framework to the narrative championed by NIST and the NSA. We examine the "Harvest Now, Decrypt Later" (HNDL) threat model and question whether the financial incentives of a projected $7.8 billion market are driving us toward a fragile cryptographic monoculture. We cover: • The "HNDL" Narrative: How the fear of future decryption is driving immediate, perhaps reckless, adoption. • The "Gold Rush": The billion-dollar valuations of startups like SandboxAQ and QuSecure despite the absence of a viable quantum threat. • Algorithmic Fragility: The catastrophic 62-minute defeat of SIKE and the "KyberSlash" vulnerabilities found in the new standards. • The "Backfire" Risk: Why rushing to complex lattice-based algorithms (ML-KEM/Kyber) might introduce more bugs than it solves. • Operational Hidden Costs: How the massive key sizes of PQC could break the IoT and satellite communications. Key Takeaway: The transition to a quantum-safe world is necessary, but the current sprint is a reckless race across a minefield. It is time to value resilience over speed. Timestamps: 0:00 - Introduction: The Emperor’s New Code 0:45 - What is "Harvest Now, Decrypt Later"? 2:30 - The $7.8 Billion PQC Gold Rush 4:15 - The "Quantum Winter" Counter-Narrative 6:00 - Proof of Immaturity: The SIKE Collapse & KyberSlash 8:20 - The Dangers of a Cryptographic Monoculture 10:10 - The Hidden Costs: Bloat and Latency 12:00 - Conclusion: The Case for Cryptographic Agility Works cited Harvest-Now, Decrypt-Later: A Temporal Cybersecurity Risk in the Quantum Transition, accessed February 13, 2026, https://www.mdpi.com/2673-4001/6/4/100 QUANTUM-READINESS: MIGRATION TO POST-QUANTUM ..., accessed February 13, 2026, https://media.defense.gov/2023/Aug/21... Post-Quantum Cryptography Market | Industry Report, 2030 - Grand View Research, accessed February 13, 2026, https://www.grandviewresearch.com/ind... SandboxAQ Has Raised an Additional $95 Million at a Company Valuation of Over $5.6 Billion - Quantum Computing Report, accessed February 13, 2026, https://quantumcomputingreport.com/sa... SandboxAQ Closes $450M Series E Round with Expanded Investor Base, accessed February 13, 2026, https://www.sandboxaq.com/press/sandb... QuSecure Awarded U.S. Air Force Contract for Post-Quantum Cybersecurity Solutions, accessed February 13, 2026, https://www.qusecure.com/qusecure-awa... Latest News from QuSecure: Funding, accessed February 13, 2026, https://www.qusecure.com/latest-news-... Beyond the Checkbox: Why 2026 is the Year of Cybersecurity Realism - Kobalt.io, accessed February 13, 2026, https://kobalt.io/beyond-the-checkbox... The ATO Bottleneck: Rethinking Responsibility and Enabling Automation, accessed February 13, 2026, https://www.uscybersecurity.net/csmag... Quantum Computing Future - 6 Alternative Views Of The Quantum Future Post 2025, accessed February 13, 2026, https://quantumzeitgeist.com/quantum-... Secure Tomorrow Series: Quantum Technologies Player Guide - CISA, accessed February 13, 2026, https://www.cisa.gov/sites/default/fi... Supersingular Isogeny Key Encapsulation - NIST CSRC, accessed February 13, 2026, https://csrc.nist.gov/csrc/media/Pres... Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath | Fox IT, accessed February 13, 2026, https://www.fox-it.com/nl/implementin... Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour, accessed February 13, 2026, https://thehackernews.com/2022/08/sin... KyberSlash: Exploiting secret-dependent division timings in Kyber ..., accessed February 13, 2026, https://kannwischer.eu/papers/2024_ky... Verified ML-KEM (Kyber) in Rust - Cryspen, accessed February 13, 2026, https://cryspen.com/post/ml-kem-imple... 2024-2025 CRA Quad Paper: The Post-Quantum Cryptography Transition: Making Progress, But Still a Long Road Ahead - Computing Research Association, accessed February 13, 2026, https://www.cra.org/wp-content/upload...