Courses and Conferences

DTI Main Reception

Do you need help?

  • Gregersensvej 8
  • 2630 Taastrup
Google MapsApple MapsRejseplanen
  • Forskerparken Fyn, Forskerparken 10F
  • 5230 Odense M
Google MapsApple MapsRejseplanen
  • Teknologiparken Kongsvang Allé 29
  • 8000 Aarhus C
Google MapsApple MapsRejseplanen
  • NordsøcentretPostboks 104
  • 9850Hirtshals
Google MapsApple MapsRejseplanen
  • Gammel Ålbovej 1
  • 6092Sønder Stenderup
Google MapsApple MapsRejseplanen

Introduction to Quantum Cryptography for IT & Security Professionals

Quantum cryptography is set to become a cornerstone of future cybersecurity, as quantum computing not only revolutionizes the technological landscape but also amplifies the risks to modern encryption systems.

>> Available in Danish <<

The emergence of quantum computing poses a significant threat to modern encryption systems, as quantum computers have the potential to break traditional encryption methods such as RSA and ECC, which rely on the difficulty of mathematical problems (such as factoring large numbers).

Conversely, quantum cryptography, particularly Quantum Key Distribution (QKD), provides security that is theoretically unbreakable. Cryptography based on the principles of quantum mechanics offers unprecedented security, making quantum cryptography the future of secure communication – particularly for public and financial institutions as well as critical infrastructure.

Prepare for the Future with Quantum Cryptography

This one-day intensive course provides IT and security professionals with a foundational understanding of quantum cryptography, its implications for cybersecurity, and how organizations can prepare for the quantum era. You will learn the principles of quantum mechanics relevant to cryptography, explore quantum-safe encryption techniques, and examine the potential impact of quantum computing on modern cryptographic protocols.

Audience

The course is relevant for IT security professionals, network and system administrators, cryptographers and cybersecurity analysts, technological decision-makers, as well as those working with compliance, risk management, cybersecurity strategy, or security technologies.

 

Prerequisites

You should have a basic understanding of classical cryptography and be familiar with general principles of cybersecurity.

Learning Objectives

  • Understand the fundamentals of quantum cryptography and quantum computing
  • Recognize the risks quantum computing poses to current cryptographic systems
  • Gain insight into quantum key distribution (QKD) and post-quantum cryptography (PQC)
  • Identify strategies for transitioning to quantum-safe security solutions
  • Be prepared to make informed decisions about quantum security in your organization

Course Overview

Session 1: Introduction to Quantum Cryptography
  • Overview of classical cryptography and its limitations
  • Introduction to quantum mechanics: Key concepts for cryptography
  • Superposition
  • Entanglement
  • Quantum measurement principles
  • How quantum computing threatens current cryptographic standards
Session 2: Quantum Key Distribution (QKD)
  • What is QKD and why is it important?
  • BB84 and E91 QKD protocols explained
  • Practical implementations and real-world applications of QKD
  • Limitations and challenges of QKD adoption
Session 3: Post-Quantum Cryptography (PQC)
  • What is post-quantum cryptography?
  • How PQC differs from quantum cryptography
  • Overview of NIST’s PQC standardization process
  • Leading post-quantum cryptographic algorithms
  • Migration strategies for enterprises
Session 4: Security Implications and Future Trends
  • The impact of quantum computing on cybersecurity and industry sectors
  • Preparing IT infrastructures for a post-quantum world
  • Quantum cryptography vs. classical cryptography: When to use what?
  • Emerging trends in quantum security and research
Q&A and Wrap-Up
  • Open discussion on challenges and opportunities
  • Recommended resources and next steps
 

Do you have any course related questions, please contact