2023-06-QLabs_homepage_hero_flag

PREPARE FOR THE
COMING STORM.

Quantum computers will
break current encryption
You have to start now.

QUANTUM
RESILIENCE
DELIVERED

We Build the Tools to Counter the
Quantum Threat

Quantum_RNG_Icon

STRENGTHENING DATA ENCRYPTION

High-speed Quantum Random Number Generator

Quntum_Key_Management_Icon

CRYPTO-AGILE KEY MANAGEMENT

Flexible deployment of crypto algorithms

2023-06-QLabs_homepage_panel2_quantumkey

QUANTUM KEY DISTRIBUTION

Uses laws of physics to secure key distribution

CAPABLE QUANTUM COMPUTERS

WILL BREAK PUBLIC KEY ENCRYPTION.

QLabs_newhomepage_panel3_table-1

  • No communication link will be trusted to be secure
  • Communication would not be trusted to be authentic
  • Transactions could be repudiated

CISOs should familiarize themselves with current quantum tech, start including quantum safe solutions in their lifecycle management, focus on improving crypto agility, and prepare for the implications of infinitely more powerful computers today.
FS-ISAC Insights: Martijn Dekker, Chief Information Security Officer, ABN AMRO

CAPABLE QUANTUM COMPUTERS

WILL BREAK PUBLIC KEY ENCRYPTION.

QLabs_newhomepage_panel3_table-1

  • No communication link will be trusted to be secure
  • Communication would not be trusted to be authentic
  • Transactions could be repudiated

MUCH CLOSER THAN THEY APPEAR

QUANTUM COMPUTERS THAT CAN BREAK PUBLIC KEY ENCRYPTION ARE CLOSER THAN YOU THINK

OLD WAY OF THINKING NEW REALITY
1,000s of Stable Qubits State Secret /New Algorithms
1,000s of Stable Qubits 100s of Stable Qubits
Classical Programming AI and Machine Learning
5-25 Years 1-3 Years
2023-06-QLabs_homepage_panel5_flag1 2023-06-QLabs_homepage_panel5_flag2

EVERY CRYPTO SYSTEM GETS BROKEN EVENTUALLY.

There is a clear and present risk to public key encryption. RSA will be broken in 1-3 years. If not by quantum computers, then by traditional silicon. It is coming. Public key encryption is at risk.

We can’t ignore 30 years of progress and assume Shor’s Algorithm is the only way to break encryption.

MUCH CLOSER THAN THEY APPEAR

QUANTUM COMPUTERS THAT CAN BREAK PUBLIC KEY ENCRYPTION ARE CLOSER THAN YOU THINK

OLD WAY OF THINKING NEW REALITY
1,000s of Stable Qubits State Secret /New Algorithms
1,000s of Stable Qubits 100s of Stable Qubits
Classical Programming AI and Machine Learning
5-25 Years 1-3 Years
2023-06-QLabs_homepage_panel5_flag1 2023-06-QLabs_homepage_panel5_flag2

EVERY CRYPTO SYSTEM GETS BROKEN EVENTUALLY.

There is a clear and present risk to public key encryption. RSA will be broken in 1-3 years. If not by quantum computers, then by traditional silicon. It is coming. Public key encryption is at risk.

We can’t ignore 30 years of progress and assume Shor’s Algorithm is the only way to break encryption.

If RSA was broken tomorrow

What would you do?

In December 2022 there was a wakeup call that RSA 2048 could be broken with 300 Qubits. Not the 1m Qubits predicted. This  Chinese research paper (which has since been debunked) touted a method in which they could use a much smaller (and currently available) amount of quantum computing power to break RSA.

2023-06-QLabs_homepage_panel6_flag

  • 2023-06-QLabs_homepage_panel6_icon_newsupercomp
    New Super Computers
  • 2023-06-QLabs_homepage_panel6_bluearrow
  • 2023-06-QLabs_homepage_panel6_icon_smallquantumcomp
    Small Quantum Computers
  • 2023-06-QLabs_homepage_panel6_bluearrow
  • 2023-06-QLabs_homepage_panel6_icon_artificialintel
    Artificial Intelligence
  • 2023-06-QLabs_homepage_panel6_bluearrow
  • 2023-06-QLabs_homepage_panel6_icon_newalgorithms
    New Algorithms (Not Shor)
  • 2023-06-QLabs_homepage_panel6_redarrow
  • 2023-06-QLabs_homepage_panel6_icon_publickeyencrpt
    Public Key Encryption

What The Experts Think

“Because of ‘store now, decrypt later’ attack...the quantum threat should be taken into account before the question of whether the development of Cryptographically Relevant Quantum Computers will ever become achievable in the future is cleared up.”

National Cybersecurity
Agency of France (ANSSI)
anssi-1

“The anticipated cracking of encryption by quantum computers must be treated as a current threat. Any data stolen today that has been encrypted with a non-quantum resistant algorithms will eventually be accessible to an adversary with a large scale quantum computer.”

Chinese Threats
in the Quantum
Era Paper

bah-1

“America must start the lengthy process of updating our IT infrastructure today to protect against this quantum computing threat tomorrow.”

White House National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (May 4, 2022)

white-house-1

“Your data is being harvested today, it will be breached tomorrow. Infrastructures, business and governments will be hacked and we won’t even know it.”

Interference Advisors & Quantropi “The quantum threat to our data & communications”

quantropi

“The threat is that they copy down your encrypted data and hold on to it until they have a quantum computer.”

Dustin Moody,
Mathematician at NIST

mit-1

“Organizations should inventory the most sensitive and critical datasets that must be secured for an extended amount of time. This information will inform future analysis by identifying what data may be at risk now and decrypted once a cryptographically relevant quantum computer is available.”

Dustin Moody,
Mathematician at NIST

homeland-security

2023-06-QLabs_homepage_panel7_flag

WINNERS ARE PICKING
TEAMS.

Why are these enterprises trusting QuintessenceLabs?

Because we’ve understood the whole problem since 2008.

QLabs_Trusted_Enterprises