NIST Algorithms Finally Bring Clarity and Certainty to the Business Community
The key takeaway from the recent NIST announcement is that the NIST algorithms finally bring clarity and certainty to the business community as they transition from algorithms such as RSA encryption to a new, tangible PQC framework.
Thales’ Falcon Algorithm Is a New Standard in Post-quantum Cryptography
Thales has been at the forefront of post-quantum cryptography research since 2013, and the selection of the Falcon algorithm by NIST is great recognition of the excellent co-development work and expertise of our crypto teams
Quantum Resistant Algorithms Enhance Cybersecurity
Maybe this will be the new standard method for securing sensitive data and protecting it from malicious cyberattacks, especially those coming from quantum computers?
Quantum-Encrypted Leased Line Service for Enterprises Released by South Korea’s KT
South Korea’s biggest telecom company KT has released a leased line service that provides quantum encryption for enterprises that handle highly sensitive information and classified data.
How Quantum-Safe Cryptography [Might] Ensure a Secure Computing Future
Quantum-safe cryptography is reckoned to replace modern encryption and safeguard future sensitive data from quantum hacking.
QuSecure Supports NIST’s Post-Quantum Cryptography Algorithm Winners
These encryption tools have been chosen to protect digital systems, networks, and devices from current threats, store now decrypt later attacks on sensitive data, and future quantum computing hacks.
Giving Birth: NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
Federal agency reveals the first group of winners from its six-year competition.
G-7 Overlords Are Not Overlooking the Quantum Threat, but It Takes 21+ Pages of Word Salad to Get There [PDF]
G-7 overlords are not overlooking the quantum threat, but it takes 21+ pages of word salad to get there.
Quantum Technology and the Potential of Zero Trust
Quantum Day or “Q-Day,” while 5-10 years out, is coming faster than we would like and it represents the day that quantum computers will reliably use the super-positioning power of qubits (i.e., information bits that can assume multiple states at once) to compute the codes needed to break asymmetric encryptions.
Test Post-Quantum Cryptography Algorithms Now, Cybersecurity Experts Say
Agencies should test post-quantum cryptography algorithms with their software and decide whether information security benefits outweigh the efficiency losses ahead of a federally mandated transition, according to security experts.