Breaking RSA Encryption – an Update on the State-of-the-Art
Learn how Quantum Computers will impact cryptography and how they’ll be able to use Shor’s quantum algorithm to crack all RSA/ECC encryption.
Webinar: Building Quantum-Resilient Data Security
Watch the recorded webinar on building quantum-resilient data security to learn about Quantum Computing, its significant implications on data protection and what can be done to build a quantum resilient security strategy.
Living in a Quantum-Safe World
Quantum technology is bringing about a new age of computing, with advances in science and medicine, and much more. However, it also brings serious security concerns – quantum-powered cyber attacks could easily defeat today’s encryption algorithms, for instance.
Quantum Computing: How to Address the National Security Risk
The characteristics of quantum computers and quantum technology, will define the future of global information technology for decades, possibly centuries, to come.
CSA: Quantum-Safe Security Awareness Survey
The Cloud Security Alliance report explores overall awareness and understanding of quantum security risk as part of a larger effort to develop a future framework for addressing these threats.
Quantum Key Distribution Systems Compared
The main quantum key distribution (QKD) systems being developed are Discrete Variable QKD and Continuous Variable QKD. We examine both systems and discuss the advantages of CV-QKD.
What is Quantum Key Distribution (QKD)?
What is quantum key distribution (QKD) and why does it matter? This technical paper explores how quantum physics provides a key exchange solution that is absolutely secure and future proof.
CSA: What is Quantum Safe Security?
Public Key Infrastructure securing the exchange of encryption keys is vulnerable to improvements in processing power, particularly Quantum Computers. This CSA paper discusses that challenge.
CSA: What is Quantum Key Distribution?
This paper from CSA provides an overview of QKD technology and how it relies on fundamental laws of nature, making it secure against the most powerful eavesdroppers.
451 Research: Key Generation In The Quantum Realm
Learn how we apply quantum physics to data security by generating encryption keys based on a quantum source rather than deterministic algorithms.
CSA: What are Quantum Random Number Generators?
This paper from the Cloud Security Alliance discusses the risks associated with poor RNG and how quantum random number generators can address them.