Cybersecurity & Cryptography

Attribute-Based Encryption Standard; Forward Looking PQC

Attribute-Based Encryption (ABE) has received two codified standards from the European Telecommunications Standards Institute (ETSI). This cryptographic system permits access to data based on a user’s crypto-key attributes vice the user per se. ABE’s compactness permits its use in CPU-constrained environments such as IoT devices. The specifications are said to enable integration of post-quantum computing-resistant encryption methods. 

Read More »

Authenticated Key Exchange: Ripe for Quantum Hacking

NIST’s post-quantum cryptographic efforts only go so far; while producing secure post-quantum computing algorithms, some cryptographic applications are left hanging. One concern is “…for software that relies on a sealing API to operate securely, there is no immediate post-quantum secure alternative to migrate to.”

Read More »

Creating Full-scale, Functioning Quantum Network

University College London scientists have been identifying components and working toward a secure quantum network between cities. The proposed network is deemed ‘large-scale’ and ‘unhackable’. Large-scale as it is designed to carry data between cities. The quantum network is considered unhackable by virtue of quantum properties which instantly reveal compromise of communications.

Read More »

Ensuring Your Encryption is Defended

The warnings are becoming more prolific: Quantum is coming and it’s going to crack encryption. Not necessarily all types of encryption will be readily hackable by quantum computers. There are several defenses one could enable, today: Cryptographic agility, doubling your symmetric key size from today’s average key size, implementation of post-quantum computing algorithms which have been proven resistant to hacking by QCs, and allowing your encryption suite to encode with both current and post-quantum computing algorithms.

Read More »

Personal Data Security Using Quantum Random Number Genrated Keys

Quantum computing-related applications to real life are emerging in the consumer sector. QBKEY brand is using quantum random number generation to create key pairs for use in their biometric (thumbprint) device. The device supports encrypted file protection and sharing, secure shell key management and password management. The QRNG key pairs are coupled with “multi-level encryption using the AES, RSA, and ECC algorithms.”

Read More »

Lattice-Based Amalgamated Algorithms, Quantum Secure, Round5

The U.S. National Institute of Standards and Technology Post-Quantum Computing project has been examining the pros and cons of nearly 70 proposed quantum secure algorithms. One proposed solution, Round5 (round5.org), boasts of “shortest key and ciphertext sizes” and holds a lead in performance and implementation. From a bandwidth, processing, and generally “size-matters” standpoint, Round5 may be the leader in NIST’s quest for a PQC algorithm solution.

Read More »

How Long Is Ten Years? Prepare Now.

Much of today’s internet traffic is encrypted, well over 50% by some estimates. As the encryption of data in motion approaches 100%, so to does the approach of quantum computers. The threat, and mitigation, is found in this un-refined disruptive technology.

Read More »

ESA, EU, AIT, QKD, QUARTZ

The Austrian Institute of Technology joins the European Space Agency and global satellite operator SES in a venture to secure communications. Using quantum key distribution techniques, the goal is to enable quantum encryption key distribution via satellite. QKD via satellite overcomes the degradation of data over distance and, more importantly, provides a nearly unbreakable delivery of cryptographic keys.

Read More »

Quantum-Secure Encryption in Your Smartphone

A team affiliated with the University of Bristol has devised a tiny (1 mm square) random number generator which generates numbers at 2.8 Gbps speeds using silicon photonics technology found in semiconductor fabrication methods. This rate of photon generation and its inherent randomness coupled with a “very low” power consumption give this QRNG potential to secure encryption at the mobile-device level.

Read More »