NEWS & INSIGHTS

Category filter: Cryptography

  • shutterstock 1152748454

    The technological evolution driven by IoT and 5G networks has posed the priority in implementing stronger cryptographic systems, raising the need for security at the edge. Near-term, quantum technologies provide a radically new toolset to realize stronger encryption systems.

    Read More
  • Post quantum cryptography

    Thus, the only efficient solution for a cybersecurity environment is not so much to just rely on post-quantum algorithms, but to have a crypto-agile cybersecurity architecture. This fact allows for a quick and efficient change of the cryptographic primitives used while always being up-to-date with the latest trends and developments in cybersecurity. This is the only way to guarantee, to the maximum extent possible, the effectiveness and efficiency of communications cybersecurity.

    Read More
  • shutterstock 2082576043 scaled

    What do we mean by "protect" the data or data security? There is a complete set of processes and practices created to protect the data for all the types of data security and all of them apply to the three core components of data security: Confidentiality, Integrity and Availability.

    Read More
  • quantum entropy

    Entropy is, undoubtedly, the main concept in quantum information theory. In this short post, we’ve tried to convey a taste of some of its main aspects, focusing on how it is used to quantify the success rate of optimum strategies in information processing tasks.

    Read More
  • Future Tech random numbers

    In cryptography, there is a core ingredient required to build any security system: unpredictable random numbers. The way to generate them isn't easy and is by means of measuring physical, random signals. In physics, unpredictability exists, and we have to leverage it in computing and security systems.

    Read More
  • Cybersecurity

    You may have already heard about the upcoming transition to quantum-safe cybersecurity as an urgent response to the cybersecurity threats posed by quantum computers. Now, with the threat identified, what solutions do we have available out there?

    Read More

Want to hear more about the quantum side?