Cryptography

High-Speed Quantum Internet 

Japanese industry research and development teams have enabled a quantum key distribution (QKD) network over a distance of 7 kilometers with a speed over 10 Mbps. 

Read More »

Authenticated Key Exchange: Ripe for Quantum Hacking

NIST’s post-quantum cryptographic efforts only go so far; while producing secure post-quantum computing algorithms, some cryptographic applications are left hanging. One concern is “…for software that relies on a sealing API to operate securely, there is no immediate post-quantum secure alternative to migrate to.”

Read More »

Quantum Random Number Generation

In encryption, the one-time pad is known as the most secure method to maintain confidentiality of data — unbreakable with completely random numbers. Acting as the cryptographic key, random numbers must be truly random or the risk to the encrypted data becomes an issue.

Read More »

Finland Approves PQC-ready Device

Finland’s National Cyber Security Authority has approved a firewall and virtual private network appliance which claims compatibility for post-quantum cryptographic algorithms. The approval and considerations for cryptographic resilience in a quantum computer world lend strength to the growing international concern over quantum supremacy’s arrival. It’s just a matter of when…because quantum is coming. 

Read More »

“Entropy Accumulation”

“Entropy Accumulation” If one sums up the entropy of their large system, including all of its parts, you have “entropy accumulation”. The research provided in

Read More »

Quantum Computing and Lawyers…

Quantum Computing and Lawyers…Encryption, cryptography, blockchain, securities, the military, etc. Though very basic, here’s a brief discussion that shows lawyers are in view of the

Read More »