How Post-Quantum Cryptography Affects Security and Encryption Algorithms
Table of Contents:
00:00 - Post-quantum adoption roadmap
01:23 - RSA, Elliptic Curve Cryptography (ECC), and Diffie-Hellman key exchange are particularly vulnerable to quantum attacks
2:12 - TLS protocols and quantum-resistant alternatives like ML-KEM
2:44 - AES brute-force attacks
03:37 - Cisco Secure Key Integration Protocol (SKIP)
04:34 - Post-Quantum Cryptography Standards
Adrian Iliesiu & Shereen Bellamy explore how to fine-tune smaller, open-source large language models for specific networking tasks, such as ticket triaging. They discuss the practical process, from selecting a base model to the critical steps of preparing high-quality, structured data.