With the advent of information security, the importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.Read more
The time has come for all organizations to put serious consideration into the future of cryptography. The evolution of technology across the spectrum has brought us to the precipice of the next great technological shift. This is why the choice of the right Hardware Security Module (HSM) is a prerequisite for a crypto-agile architecture.
The recent trends in information technology and communications have emerged as one of the main technological pillars of the modern age. The importance of cryptography has gained importance due to the requirement of security services (confidentiality, integrity, authenticity, and non-repudiation) in data storage/transmission.Read more
There is a significant uncertainty when it comes to the impact of quantum computing on modern cryptography. Perhaps the largest concern centers on just exactly when the quantum cryptography apocalypse will occur. While there are flurries of activity surrounding both the development of stable quantum computers and the cryptography algorithms that can withstand them, many are operating on what is at best a "loose" timeline. To help you on your journey to crypto-agility, let's take a look into how to determine your timeline for post-quantum preparation.Read more
Post-quantum cryptography has a strong impact on Entrust Datacard's main business areas:
on SSL, PKI, as well as on the authentication business.
It has taken over two decades to establish and secure the current e-commerce applications. The security of most of these systems principally relies on cryptographic algorithms which have served the purpose till now. Since the initiation and evolution of quantum computing, some cryptographic algorithms have threats. To mitigate the security gap, numerous post-quantum algorithms have been proposed. This article enlightens the journey towards post-quantum algorithms and security parameters of the newly proposed post-quantum algorithms.Read more
In this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.Read more