skip to Main Content

Why QuintessenceLabs?

QuintessenceLabs is at the forefront of quantum cybersecurity, providing the strongest data protection to keep your information safe against today’s and tomorrow’s threats. Our capabilities extend from quantum key generation, crypto-agile key management through to quantum key distribution, helping you…

Read more

What are the different random number generation methods?

Pseudo-random number generator (PRNG): uses algorithms to produce random results, often from short randomization seeds. Their generators are capable of high throughputs, but attackers can derive the random number from knowledge of the seed. Hardware/true random number generator (TRNG): measures…

Read more

Why is the strength of encryption keys important?

The strength of your encryption relies on the strength of the encryption keys. Weak (predictable) keys will allow attackers to easily break the algorithm behind them and access your “encrypted” data. With the increase in computing power, being quantum-safe means…

Read more

What are post-quantum encryption algorithms?

Cybersecurity relies on several industry-standard encryption algorithms such as RSA and ECC for exchanging keys and AES for encrypting the data itself. Since each is secured using different mathematical approaches, not all of them will remain secure in a quantum…

Read more

Why do quantum computers threaten cybersecurity?

Quantum computers are very different to traditional computers. For example, they use quantum bits, or qubits, which can represent a “0” and a “1” simultaneously. Their processing power increases exponentially with the number of these qubits, which is one reason why…

Read more

What are the different types of QKD systems?

Discrete Variable QKD: this is the most common and oldest protocol (BB84 or EK91 protocol) and is originally based on the transmission of information encoded on the physical properties of a single photon. The generation of a true single photon…

Read more