Cybersecurity & Cryptography
Post-Quantum Cryptography
Low Power-High Performance
WHITEPAPERS
The background, impact, and urgency of the threat of quantum computing to the contemporary cryptographic infrastructure, and what can be done about it.
August 11th, 2021 –
By: Arm
Quantum computing is increasingly seen as a threat to communications security: rapid progress towards realizing practical quantum computers has drawn attention to the long understood potential of such machines to break fundamentals of contemporary cryptographic infrastructure. While this potential is so far firmly theoretical, the cryptography community is preparing for this possibility by developing Post-Quantum Cryptography (PQC), that is, cryptography resisting the increased capabilities of quantum computers. In this white paper, we explore the background, impact, and urgency of this threat, and summarize the cryptographic schemes being evaluated. We also provide recommendations on what steps should be taken today to be prepared for the changes to come, and discuss how Arm is approaching PQC.
Click here to read more.
Quantum Threat to Blockchain Addressed by Cambridge Quantum, Tec de Monterrey and IDB Lab
The Inter-American Development Bank and its innovation laboratory, IDB Lab, together with Cambridge Quantum (CQ) and Tecnológico de Monterrey have identified and resolved potential threats to blockchain networks posed by the advent of quantum computer development. In response to these threats, the project team developed a cryptographic layer that allows blockchain networks to protect themselves from this new generation of computing technologies.
The Shorts | 8/10/21 | Cybersecurity and Cryptography in Quantum Computing
The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt
Smashing Through the Encryption Algorithms… Is Your Organization Prepared?
Quantum computing is proving to be enormously exciting for financial institutions. Already, Goldman Sachs and Deutsche Börse are exploring quantum algorithms to calculate risk model simulations 1,000 times faster than currently possible, while BBVA is looking to quantum to optimise investment portfolio management.
Quantum Safe Encryption Guzzles Power, TUM’s Post-Quantum Processing Chip Efficiency May be the Answer
A post-quantum chip with hardware trojans A team at the Technical University of Munich (TUM) has designed and commissioned the production of a computer chip
The Shorts | 8/3/21 | Cybersecurity and Cryptography in Quantum Computing
The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt
U.S. Army Network Warfare Tomography Sees Challenges With Quantum Environment
Army scientist coauthors network performance for warfighters book Read More… + Network tomography refers to the use of inference techniques to reconstruct detailed views of
South Korea: Q Crypton Platform Unveiled, to be Used in Data Security, Quantum-Resistant Passwords
The Electronics and Telecommunications Research Institute (ETRI) said that the new platform called “Q Crypton,” unveiled at an online conference on July 21, can verify the quantum safety of various cryptographic systems such as RSA, which is a public-key cryptosystem that is widely used for securing data transmission, and next-generation quantum-resistant passwords.
South Korea: Q Crypton Platform Unveiled, to be Used in Data Security, Quantum-Resistant Passwords
The Electronics and Telecommunications Research Institute (ETRI) said that the new platform called “Q Crypton,” unveiled at an online conference on July 21, can verify the quantum safety of various cryptographic systems such as RSA, which is a public-key cryptosystem that is widely used for securing data transmission, and next-generation quantum-resistant passwords.