HOPE_16 2025 - Quantum Computing and AppSec: Preparing for the Post- Quantum Threat - 8th Talk
About HOPE Conference
Hackers On Planet Earth (HOPE) is one of the most prestigious and longest-running hacker conferences in the United States, sponsored by 2600: The Hacker Quarterly. Since 1994, HOPE has been a cornerstone of the hacker community, bringing together security researchers, hackers, activists, and technology enthusiasts worldwide.
HOPE_16 marked a historic milestone—transitioning from biennial to annual, moving to St. John’s University in Queens, NY (August 15-17, 2025). The conference features cutting-edge talks, workshops, film screenings, art installations, and the famous lockpicking village, rooted in the original hacker ethos of curiosity, learning, and challenging established systems.
Talk: Quantum Computing and AppSec: Preparing for the Post-Quantum Threat
Talk Overview
Quantum computing poses an existential threat to cryptographic foundations of modern cybersecurity. This presentation combined technical depth with practical guidance on preparing for the post-quantum era, tailored for HOPE’s technically sophisticated audience.
The Quantum Threat Landscape
Current encryption methods (RSA, ECC) securing web applications, APIs, and sensitive data risk becoming obsolete due to quantum attacks via Shor’s Algorithm. The "harvest now, decrypt later" threat means adversaries are already collecting encrypted data today for future decryption, making post-quantum cryptography (PQC) migration urgent.
What Attendees Learned
-
Timeline and Reality: Q-Day implications and threat timelines
-
Cryptographic Vulnerabilities: Which algorithms are vulnerable (RSA, ECC, Diffie-Hellman) vs. quantum-resistant (AES-256)
-
Post-Quantum Cryptography: NIST’s selected PQC algorithms (CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+)
-
Migration Strategies: Crypto-agility, hybrid approaches, prioritization frameworks
-
Practical Implementation: Code examples, library updates, testing methodologies
The presentation included live demonstrations of vulnerable vs. quantum-safe implementations and a prioritization framework for securing high-value assets first.
Slides can be found here: View Slides