Talk details

Quantum computing is emerging as a real threat to current encryption methods. In this talk, I'll cover the following topics.
Post-Quantum Cryptography (PQC) and its importance for Java
How quantum-resistant algorithms can withstand attacks that would break today’s standards like RSA and ECC.
Risks to existing Java systems, such as the possibility that future quantum computers could decrypt today’s secure data if systems aren’t upgraded.
What we should prepare: covering Java 24’s new security features (quantum-safe key exchange and signatures) and tools like Bouncy Castle for implementing PQC.
Performance impacts (larger keys, slower operations) and how to test systems for efficiency and security
Attendees will learn practical steps to add PQC to Java applications, including updating libraries, using new APIs, and combining old and new algorithms for compatibility. Also, Attendees will learn what Java developers should monitor as PQC adoption grows.

Key Takeaways:
Understand quantum computing’s threat to Java encryption and the risk timeline.
Learn about PQC algorithms and new Java support (JDK 24).
Get practical migration guidance, including tools, integration, and performance tips.
Discover how to future-proof skills and applications for the post-quantum era.

Target Audience:
Java developers, architects, technical leads, and security engineers responsible for application security. Having basic knowledge of Java security libraries and public-key encryption is preferrable.
Akihiro Nishikawa
Microsoft
Aki loves A JVM/GraalVM and JVM based open-source technologies, and also a board member of JJUG (Japan Java Users Group). As a Cloud Solution Architect in Microsoft, he has been helping customers solve their technical challenges with his expertise in application development (containers, PaaS, DevOps, and so on) and application integration (iPaaS such as system/business process orchestration, API management).