Cybersecurity

The Basics on Preparing for a Post-Quantum Computing World

Using quantum computing, attackers can likely break even the most advanced encryption methods. The greatest concerns are Shor’s Algorithm and Grover’s Algorithm, which are two of the most touted capabilities of quantum computing. Once these are easy for attackers to obtain, they will be able to use these algorithms to break existing symmetric, and asymmetric, defenses.

Read More »

Czech Republic Opens Quantum Security Lab, Plans to Secure National Data

The new laboratory with the so-called quantum communication infrastructure is available to experts from the Faculty of Electrical Engineering and Communication of the Brno University of Technology. The laboratory will enable scientists to work on next-generation computer networks that will also be protected from quantum computer attacks, to which the vast majority of current networks, including the Internet, are vulnerable.

Read More »