Encryption

High-Speed Quantum Internet 

Japanese industry research and development teams have enabled a quantum key distribution (QKD) network over a distance of 7 kilometers with a speed over 10 Mbps. 

Read More »

Ensuring Your Encryption is Defended

The warnings are becoming more prolific: Quantum is coming and it’s going to crack encryption. Not necessarily all types of encryption will be readily hackable by quantum computers. There are several defenses one could enable, today: Cryptographic agility, doubling your symmetric key size from today’s average key size, implementation of post-quantum computing algorithms which have been proven resistant to hacking by QCs, and allowing your encryption suite to encode with both current and post-quantum computing algorithms.

Read More »

Quantum-Secure Encryption in Your Smartphone

A team affiliated with the University of Bristol has devised a tiny (1 mm square) random number generator which generates numbers at 2.8 Gbps speeds using silicon photonics technology found in semiconductor fabrication methods. This rate of photon generation and its inherent randomness coupled with a “very low” power consumption give this QRNG potential to secure encryption at the mobile-device level.

Read More »

Quantum Random Number Generation

In encryption, the one-time pad is known as the most secure method to maintain confidentiality of data — unbreakable with completely random numbers. Acting as the cryptographic key, random numbers must be truly random or the risk to the encrypted data becomes an issue.

Read More »

Encryption Is In Danger; What About Hashing?

“The goal of a good hash function is to make it extremely difficult for attackers to find ways of generating inputs that hash to the same value…” Quantum computing is certainly a veritable threat to encryption. But what about its sister cryptographic apparatus, the hash? Arguably as important as encryption, the hash provides vital services to verifying data integrity. How much of a threat is quantum computing to this function?

Read More »

“Computationally Infeasible”

Quantum key distribution (QKD), a method of distributing secret keys between two parties, is possible – today – in enabling perfect secrecy between two-parties. Researchers have recently shown this ability to maintain perfect secrecy over fiber-optic wires

Read More »