Secure Talk podcast | by Strike Graph

Cryptography, quantum computing, and the future of security with Dr. Bill Anderson

Written by Strike Graph Team | Jan 14, 2025 5:55:00 PM

 

Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators.

I’ve been utilizing cryptography in the development of web applications since my first professional web application development work. Although I’ve rarely understood the underlying technology and mathematics of cryptography.

In this episode of SecureTalk, our guest is Dr. Bill Anderson, an expert in cryptography. Bill shares his journey into the field, starting as a student in electrical and computer engineering. He inadvertently ventured into cryptography during his postgraduate studies. He discusses the evolution of cryptography, its historical context, and the impact of quantum computing on current cryptographic methods.

We explore various topics, including public key cryptography, digital signatures, and the ongoing need for crypto agility. Bill also provides insights into his current role as Principal Product Lead at Mattermost, a secure collaboration platform focused on data sovereignty and security. This episode offers a comprehensive look at modern cryptographic techniques and the challenges posed by future advancements in computing, making it a must-listen for anyone interested in cybersecurity and cryptography.

00:00 Welcome to SecureTalk: Introduction and Host Introduction

00:33 The Role of Security in Business Growth

01:55 Introducing Dr. Bill Anderson: A Security Expert

03:57 Dr. Anderson's Journey into Cryptography

05:35 The Evolution of Security and Cryptography

08:11 Understanding Business and Technology Landscapes

13:56 Mattermost: A Secure Collaboration Platform

22:01 The History and Methods of Cryptography

25:01 Understanding Public and Private Keys

25:58 Digital Signatures and Authentication

27:12 The Open Research Model in Cryptography

28:31 Challenges in Cryptographic Security

31:02 Quantum Computing and Cryptography

35:38 The Future of Cryptographic Systems

42:04 NIST's Role in Quantum-Safe Cryptography

49:41 Conclusion and Final Thoughts