Addressing the Quantum Computing and Cryptographic Security Training Pipeline

Addressing the Quantum Computing and Cryptographic Security Training Pipeline Who Is Teaching the Next Generation of Cryptographic Hardware Experts? Excerpts and salient points ~ +  “The big challenge on the horizon is quantum computing,” Aysu says. “The concern is that when quantum computing systems become a publicly-available reality – which many people think will be […]

Arguments for the Security of Continuous-variable Quantum Key Distribution (CVQKD)

Arguments for the Security of Continuous-variable Quantum Key Distribution (CVQKD) Synopsis: Making Quantum Cryptography Safe and Practical Excerpts and salient points ~ +  Most protocols for quantum key distribution (QKD)—a quantum cryptography technique—encode an encryption key in discrete quantum states, such as the two orthogonal polarizations of a photon. While some QKD protocols are immune […]

Quantum-proof Security to Enhance Trading Security

Quantum-proof Security to Enhance Trading Security Cybersecurity is the foundation to a successful corporate environment. If attribution were easy, we believe this would be inarguable and every organization would have to accept responsibility.  AlphaNu and Kelvin Wallet’s collaboration looks to be in focus.  Qubit. Future-proof Cryptography & Security Excerpts and salient points ~ +  As a […]

Israeli Disruptive Technology “Scale-Up” Companies to London

Israeli Disruptive Technology “Scale-Up” Companies to London From start-up to scale-up: Israeli high tech in the UK Excerpts and salient points ~ +  There is no question that the UK market is a key component in Israeli companies’ overseas strategy, and a key foothold to global expansion. On 26th June, UK Israel Business (UKIB) is […]

Sampling of Quantum Computing; French Perspective

Rinvigorating a Factory Quantum

Sampling of Quantum Computing; French Perspective Computers: Promises of the Quantum Dawn Excerpts and salient points ~ +  In this race for the greatest number of qubits and the creation of a quantum computer, two systems, currently neck and neck, offer the most interesting prospects. The first involves trapped ions. Developed in the early 1990s, […]

ISARA Leadership & ETSI Quantum-safe Cryptography Working Group

ISARA Leadership & ETSI Quantum-safe Cryptography Working Group ISARA COO Mark Pecen Re-Elected Chairman of ETSI Quantum-safe Cryptography Working Group Excerpts and salient points ~ +  Mark Pecen, chief operating officer of ISARA Corp., has been re-elected chairman of the European Telecommunication Standards Institute’s (ETSI) Quantum-safe Cryptography Working Group focused on setting standards for the […]

“Generating Pure Randomness”

“Generating Pure Randomness” How to Turn a Quantum Computer Into the Ultimate Randomness Generator Excerpts and salient points ~ +  Randomness is crucial for almost everything we do with our computational and communications infrastructure. In particular, it’s used to encrypt data, protecting everything from mundane conversations to financial transactions to state secrets. +  Genuine, verifiable […]

Neven’s Law & The Doubly Exponential Rate of Quantum Computing Power

Neven’s Law & The Doubly Exponential Rate of Quantum Computing Power A new “law” Suggests Quantum Supremacy Could Happen This Year Excerpts and salient points ~ +  In December 2018, scientists at Google AI ran a calculation on Google’s best quantum processor. They were able to reproduce the computation using a regular laptop. Then in […]

Quantum Computing and the Threat to Modern Communications

Quantum—a double-edged sword for cryptography Quantum computers pose a big threat to the security of modern communications, deciphering cryptographic codes that would take regular computers forever to crack. But drawing on the properties of quantum behaviour could also provide a route to truly secure cryptography… READ MORE   Source: Phys.org PhysicsI Published on 2019-06-11  

Quantum Computing is Real.  How to Protect your Data…

Quantum Computing is Real.  How to Protect your Data… Quantum computing is real and coming, seemingly sooner than later.   To help protect your organization’s data, a broad overview of quantum computing, its threat to encryption and  cryptography, and how to prepare your defense is wise to get going, today.  Is your organization prepared?  Qubit. Getting […]