Header image

Session 2.4b: Tutorial - Post-Quantum Cryptography: Protecting Platforms in the "Harvest Now, Decrypt Later" Age

Tracks
Wednesday, November 19, 2025
11:30 AM - 12:30 PM
Bradman Theatre

Details

Advances in quantum computing and AI are rapidly changing the threat landscape, and the emergence of cryptographically relevant quantum computers poses a significant threat to current encryption standards, particularly those relying on the difficulty of factoring large numbers (like RSA) or discrete logarithms (like ECC). The increasing qubit counts and fidelity of quantum computers are pushing towards the computational power needed to break these algorithms. For example, IBM's "Blue Jay" system, projected for around 2033, is designed to be capable of executing 1 billion quantum operations over 2,000 logical qubits, pushing towards the scale needed for significant cryptographic breakthroughs. What was once a distant threat is now right around the corner, and threat actors are actively looking to harvest data now, and crack encryption following "Q-Day". Red Hat Enterprise Linux (RHEL) is available across Defence, and in this tutorial session, we'll look at how you can better protect platforms using post-quantum cryptography. In this session we'll cover: - The threat posed by "harvest now, decrypt later" - Encryption that can be potentially "cracked" by cryptographically-relevant quantum computers - The quantum-resistant algorithms available with Red Hat Enterprise Linux (RHEL) - Red Hat's roadmap for post-quantum cryptography - How you can get started and enable post-quantum cryptography in Red Hat Enterprise Linux (RHEL) using a system-wide cryptographic profile.


Speaker

Agenda Item Image
Mr Ben Shepherd
Account Solution Architect
Red Hat

Biography

Ben Shepherd has been around technology for a while; from flying the AP-3C Orion through to deploying containers. His background is in cyber security, and brings this passion to enabling tcapability while ensuring compliance.
loading