Post-Quantum Security

Trends and developments in modern cryptography

The rapid development of quantum computers threatens many of today's established IT security procedures. In the near future, these powerful computers could be capable of breaking through common encryption methods, which would pose a massive threat to the confidentiality and integrity of digital information. In particular, attackers could gain virtually unrestricted access to networked systems and manipulate data at will.

To proactively address these potential threats, attend the “Post-Quantum Security” course. This training will give you an in-depth understanding of how quantum computers work and their impact on IT security. A central component of the training is an introduction to post-quantum cryptography. These new cryptographic methods are designed to withstand attacks by quantum computers. Participants will learn how to implement these methods to future-proof their IT infrastructures. This is particularly relevant for areas with long deployment cycles, such as critical infrastructures or government systems, where early protection against future threats is essential.

The training places great emphasis on practical relevance. In addition to teaching theoretical basics, practical exercises are carried out that enable participants to directly apply the knowledge they have acquired.

In addition, you will benefit from exchanges with subject matter experts and gain insights into current research topics in the field of post-quantum security. This specialized knowledge is currently only available to a small circle of experts and thus offers a valuable advantage for anyone who wants to prepare early for the coming changes in IT security.

Overall, the training offers a unique opportunity to take an in-depth look at the challenges and solutions in the context of the quantum computer era and to equip your own organization accordingly.

 

 

After the training, you will be able to:

  • understand how quantum computers work and how they differ from classical computers.
  • program quantum gates and gain initial experience with simple quantum algorithms.
  • assess the impact of Shor's and Grover's algorithms on modern cryptography and apply post-quantum cryptography to secure IT systems against future threats.

 

OVERVIEW
Type of event
Inhouse-Format
Format
Online
Graduation
Certificate of attendance
access Requirements
Basic knowledge of IT security and cryptography is an advantage, but not essential.
Language
English
TARGET GROUP - this seminar is exactly right for:
  • Administrators who want to make their IT infrastructure post-quantum secure today
  • IT security users who want to understand how IT security will evolve in the coming years
  • Professionals and specialists from the high-security industry
CONTENTS - These topics will be covered in the seminar:
  • Functioning of a quantum computer
  • Quantum gates and simple quantum algorithms with hands-on simulations
  • The impact of Shor's and Grover's algorithms on modern cryptography
  • Introduction to post-quantum cryptography, practical exercises on the subject
  • The ongoing standardization by NIST
further information

You will find further information about the seminar here shortly.

SPEAKERS

Prof. Daniel Loebenberger


Daniel Loebenberger earned his doctorate in 2012 at the University of Bonn in the field of cryptography and worked there in research and teaching until the end of 2015. From 2016 to 2019 he worked as an IT security expert with a focus on cryptography at genua GmbH, a subsidiary of Bundesdruckerei, on various topics of professional high-security components. Since January 2019, Daniel Loebenberger has been appointed Professor of Cybersecurity at the East Bavarian Technical University Amberg-Weiden and also leads the group of the Fraunhofer Institute for Applied and Integrated Security (AISEC) at the Weiden location. In the local Cybersecurity Learning Lab, topics of so-called 'white-hat hacking,' applied cryptography, and secure infrastructure, particularly in the context of the Internet of Things, are addressed in research and teaching.

Contact

 

Academic Contact

Prof. Dr. Daniel Loebenberger

Fraunhofer AISEC (Standort Weiden)

Telefon +49 89 3229986-139

 

Administrative Contact

Adem Salgin

Fraunhofer Academy

Telefon +49 89 1205-1555