Quantum Resistant Cryptocurrency: The Crown Sovereign
Bitcoin.com announced that it will be listing a quantum-resistant cryptocurrency, the Crown Sovereign, on the Bitcoin.com Exchange in late September. Protected with a next-generation approach to One-Time Pad encryption, the Crown Sovereign ensures the timeless protection and value of users’ sensitive data, even alongside the emergence of quantum technology. The launch is a significant achievement for Crown Sterling as it seeks to empower data sovereignty in the dawn of quantum computing with next-generation AI encryption products.
CB Insights: QuSecure Ranks Among Top Companies in Post-Quantum Cybersecurity
QuSecure, Inc. (QuSecure), has been named as 1 of the top 28 cybersecurity firms by CB Insights in their “Cyber Defenders 2021: The 28 companies defending businesses from next-gen cyber-attacks,” and Qusecure was chosen as one of only two companies for the prestigious Post-Quantum Cryptography category.
The Shorts | 8/17/21 | Cybersecurity and Cryptography in Quantum Computing
The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt
Quantum-Safe Satellite Communications Without Quantum Key Distribution Now Commercially Available
Space EA’s new post-quantum encryption network defeats quantum’s destructive effect against security, while enabling satellite architectures and communication networks the ability to harness quantum’s power for DoD and commercial clients in the space sector.
Post-Quantum Cryptography
Low Power-High Performance
WHITEPAPERS
The background, impact, and urgency of the threat of quantum computing to the contemporary cryptographic infrastructure, and what can be done about it.
August 11th, 2021 –
By: Arm
Quantum computing is increasingly seen as a threat to communications security: rapid progress towards realizing practical quantum computers has drawn attention to the long understood potential of such machines to break fundamentals of contemporary cryptographic infrastructure. While this potential is so far firmly theoretical, the cryptography community is preparing for this possibility by developing Post-Quantum Cryptography (PQC), that is, cryptography resisting the increased capabilities of quantum computers. In this white paper, we explore the background, impact, and urgency of this threat, and summarize the cryptographic schemes being evaluated. We also provide recommendations on what steps should be taken today to be prepared for the changes to come, and discuss how Arm is approaching PQC.
Click here to read more.
Quantum Threat to Blockchain Addressed by Cambridge Quantum, Tec de Monterrey and IDB Lab
The Inter-American Development Bank and its innovation laboratory, IDB Lab, together with Cambridge Quantum (CQ) and Tecnológico de Monterrey have identified and resolved potential threats to blockchain networks posed by the advent of quantum computer development. In response to these threats, the project team developed a cryptographic layer that allows blockchain networks to protect themselves from this new generation of computing technologies.
The Shorts | 8/10/21 | Cybersecurity and Cryptography in Quantum Computing
The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt
Smashing Through the Encryption Algorithms… Is Your Organization Prepared?
Quantum computing is proving to be enormously exciting for financial institutions. Already, Goldman Sachs and Deutsche Börse are exploring quantum algorithms to calculate risk model simulations 1,000 times faster than currently possible, while BBVA is looking to quantum to optimise investment portfolio management.
Quantum Safe Encryption Guzzles Power, TUM’s Post-Quantum Processing Chip Efficiency May be the Answer
A post-quantum chip with hardware trojans A team at the Technical University of Munich (TUM) has designed and commissioned the production of a computer chip that implements post-quantum cryptography very efficiently. Such chips could provide protection against future hacker attacks using quantum computers. The researchers also incorporated hardware trojans in the chip in order to […]
The Shorts | 8/3/21 | Cybersecurity and Cryptography in Quantum Computing
The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt