Mobile Carrier LG U+ Applying Quantum Resistant Cryptography in Pilot Project
LG Uplus tests commercial usefulness of quantum-resistant cryptography technology Points to note… + LG Uplus (LGU+) has partnered with Cheon Jung-hee, a Seoul National University professor of mathematical sciences who heads Cryptolab, a lab involved in encryption and data security, to commercialize post-quantum cryptography (PQC) technology, which refers to cryptographic algorithms that are thought to […]
Cybersecurity Products Touting Quantum Safe(ty) Grows: fragmentiX
OEM Partnership Between Dell Technologies and fragmentiX Storage Solutions In October 2020 the Austrian IT security company fragmentiX Storage Solutions GmbH became a worldwide OEM Solutions partner of Dell Technologies. The fragmentiX CLUSTER Storage Appliances are produced according to fragmentiX specifications at Dell Technologies in Europe. Following the principle of secret sharing, they enable data to […]
intel Looks to Reduce the CPU Cost of Intensive Computations, Encrypting Your Grocery List, Spurred by Quantum Computing’s Spectre
Crypto Acceleration: Enabling a Path to the Future of Computing Intel sees a future where everything is encrypted, from your grocery list to your medical records. Today, data is cryptographically protected across layers of the software, network and storage stacks, resulting in the potential for multiple cryptographic operations being performed on every byte of data. […]
IronCAP X Quantum Resistant Encryption Instantiation Making a Play for U.S. Government Use
Good read for the layperson. Basic quantum resistant encryption discussion and one solution for securing your email. Worth the review from the source link, below. Because Quantum is Coming. Qubit The key to creating quantum-resistant encryption is to get away from the core strength of computers, according to one expert. Read More… + Two years […]
U.S. NSS System Owner? Take Heed of These Four Steps Now to be Quantum Secure Before Quantum Arrives
Defending against the cryptographic risk posed by quantum computing Read More… + The National Security Agency is responsible for protecting NSS against quantum computing risks. In 2015, NSA published guidance highlighting the need to prepare for the advent of a quantum computer, and encouraging the development of post-quantum cryptographic algorithms. + The National Institute of […]
Study: Not All Secure Quantum Message Authentication Codes are Better than Classical Codes
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources Abstract + In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the tag. + We address the question […]
South Korea’s KT Advances Quantum Communication Hardware Switching Technology
KT develops new technology for uninterrupted quantum cryptographic communication service In brief… + KT, a major telecom company in South Korea has developed a new technology that enables a quantum cryptographic communication service without interruption. It can increase the stability of quantum cryptography communication infrastructure in the defense and financial sectors that require high levels […]
Cloud Security for Quantum Computing & What’s Your Crypto Plan?
How to Secure Quantum Computing in the Cloud Key points… + Quantum computing will likely arrive sooner than expected. 2020 has seen many leaps in the advance of quantum computing, including IBM announcing they will have a quantum processor available by the end of 2023. Enterprises need to prepare now for the potential threat of […]
Quantum-Safe Encryption as a Service Coming to Academic and Commercial 5G Networks in U.S.
Indiana 5G Zone: First to Demonstrate Quantum-Safe Encryption as A Service for 5G IoT Systems The Indiana 5G Zone is focused on developing new commercial 5G applications such as Smart Manufacturing and Smart Communities to support economic growth The Indiana 5G Zone utilized XQ Message’s crypto-agile platform to transparently encrypt IoT data and track movement […]
“Re-Used Address” and “Double-Spend” Attacks are Just Two Types of Hacking Attacks Quantum Computing Could Exploit to Break Your Bitcoin
Threat of Quantum Computing to Bitcoin Should be Taken Seriously, But there’s Enough Time to Upgrade Current Security Systems, Experts Claim Read More… + LocalBitcoins, a leading peer to peer (P2P) Bitcoin exchange, notes that with the advent of quantum computing, there have been concerns that this new technology could be a threat to existing […]