Elliptic Curve Cryptography (ECC)

Personal Data Security Using Quantum Random Number Genrated Keys

Quantum computing-related applications to real life are emerging in the consumer sector. QBKEY brand is using quantum random number generation to create key pairs for use in their biometric (thumbprint) device. The device supports encrypted file protection and sharing, secure shell key management and password management. The QRNG key pairs are coupled with “multi-level encryption using the AES, RSA, and ECC algorithms.”

Read More »

“C” is for “Commutative”

This past week, cryptologists from Belgium and The Netherlands released a report on a post-quantum computing algorithm promising quantum resistance. The claim is the algorithm provides a non-interactive key exchange while similar in construct to common elliptic curve cryptosystems (ECCs). This commutative, super-singular elliptic-curve, is touted as being able to be “dropped-in” to replace instantiations of quantum-vulnerable ECCs while maintaining quantum-resistant security schemes.

Read More »