Header image

Session 2.4b: Tutorial - Post-quantum cryptography: Protecting platforms in the "harvest now, decrypt later" age

Tracks
Wednesday, November 19, 2025
11:30 AM - 12:30 PM
Bradman Theatre

Details

Advances in quantum computing and AI are rapidly changing the threat landscape, and the emergence of cryptographically relevant quantum computers poses a significant threat to current encryption standards, particularly those relying on the difficulty of factoring large numbers (like RSA) or discrete logarithms (like ECC). The increasing qubit counts and fidelity of quantum computers are pushing towards the computational power needed to break these algorithms. For example, IBM's "Blue Jay" system, projected for around 2033, is designed to be capable of executing 1 billion quantum operations over 2,000 logical qubits, pushing towards the scale needed for significant cryptographic breakthroughs. What was once a distant threat is now right around the corner, and threat actors are actively looking to harvest data now, and crack encryption following "Q-Day". Red Hat Enterprise Linux (RHEL) is available across Defence, and in this tutorial session, we'll look at how you can better protect platforms using post-quantum cryptography. In this session we'll cover: - The threat posed by "harvest now, decrypt later" - Encryption that can be potentially "cracked" by cryptographically-relevant quantum computers - The quantum-resistant algorithms available with Red Hat Enterprise Linux (RHEL) - Red Hat's roadmap for post-quantum cryptography - How you can get started and enable post-quantum cryptography in Red Hat Enterprise Linux (RHEL) using a system-wide cryptographic profile.


Speaker

Agenda Item Image
Mr Shane Boulden
Solution Architect
Red Hat

Biography

Shane Boulden is a solution architect at Red Hat, supporting Fortune 500 companies and government organisations across Australia and the region to adopt open source technologies. He has contributed to security-focused open source projects like 'Compliance as Code', StackRox, and Keycloak, and is a contributing author to the second edition of "The Kubernetes Bible". Shane specialises in OpenShift and Enterprise Linux security and compliance, and his recent focus has been helping organisations adopt security policy-as-code with OpenShift. Ben Shepherd is an accomplished Solution Architect, having spent 15 years in the Australian Defence Force and holding over five years of technology and cyber security experience both in and out of uniform. He holds a Masters degree in Cybersecurity Operations and brings a security focus to technology capability discussions. He is particularly enthusiastic in taking technology to the edge, especially in austere and challenging environments with a focus on continual capability delivery.
Agenda Item Image
Mr Ben Shepherd
Account Solution Architect
Red Hat

Biography

Ben Shepherd has been around technology for a while; from flying the AP-3C Orion through to deploying containers. His background is in cyber security, and brings this passion to enabling tcapability while ensuring compliance.
loading