How Entrust Datacard pioneers the road to post-quantum in spite of all uncertainties

Post-quantum cryptography has a strong impact on Entrust Datacard's main business areas: 
on SSL, PKI, as well as on the authentication business.

Read more

NIST shortlisted 26 algorithms for focal post-quantum research - get all the details here

It has taken over two decades to establish and secure the current e-commerce applications. The security of most of these systems principally relies on cryptographic algorithms which have served the purpose till now. Since the initiation and evolution of quantum computing, some cryptographic algorithms have threats. To mitigate the security gap, numerous post-quantum algorithms have been proposed. This article enlightens the journey towards post-quantum algorithms and security parameters of the newly proposed post-quantum algorithms.

Read more

How Samsung prepares devices sold today for a life in the post-quantum era

In this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.

Read more

Crypto-agile HSMs by Utimaco used in research for post-quantum cryptography

With every passing day, the need for crypto agility becomes more and more important. Whether you believe quantum computing is 10 years, 20 years or more away, the inevitability is that it is approaching fast. In the world of cryptography, Key Management Systems (KMS) are already well down the path of developing technologies for a quantum world. However, the KMS is only one portion of a total cryptography solution. This is why many leading technology organizations have begun research on Hardware Security Modules (HSMs) and their role in crypto agility.

Read more

Michele Mosca: Quantum computing will decimate the security infrastructure of the digital economy (video)

Quantum computing will decimate the security infrastructure of the digital economy. Quantum computing in general is certainly a blessing to humanity in many respects and it promises to disrupt evolution of technology in more than one dimensions. But it is also a curse to security, as cryptographic algorithms that proved to be secure for decade may be breached by quantum computers within minutes.

Read more

Is blockchain fit for the post-quantum future?

Cryptography is one of the cornerstones of all blockchain infrastructures. Hashes link blocks together and public-private key cryptography helps secure data and verify transactions. A major advantage of blockchain is that its cryptography man es it virtually untamperable, with changes in the crypto being virtually impossible.

Read more

Utimaco Applied Crypto Symposium in the US 2018

Quantum computers will revolutionize many industries and will be powerful enough to break all commonly used public key cryptographic algorithms.

Read more

What is crypto-agility and how to achieve it?

Crypto-agility can be elaborated as the ability and aptitude of a system to promptly shift from the existing cryptographic algorithms and primitives to the newer and updated ones. With the advent of quantum computing, it has been obvious that the RSA based public-key systems which stand on large integer factorization and discrete logarithm problems would be breakable.

Read more

Intelligent banking needs a cybersecurity edge

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector. How can the industry ensure their cybersecurity strategy matches the rest of their next-gen business?

Read more

Ready to take off?

Download our HSM simulator!

Register for free