What is Post Quantum Cryptography?
Cryptography that is implemented using algorithms that are thought safe from future quantum attack. Today’s asymmetric algorithms underpinning most internet transactions are at risk and need to be replaced with PQC algorithms, however while they are better than what is in place not even these PQC algorithms are proven secure.
Why do I need Post Quantum Cryptography now?
Data is already at risk. In many environments, it will take up to a decade to migrate to post quantum cryptography. At an absolute minimum, data must be secured with PQC prior to a quantum computer being able to decrypt it. Any data using today’s encryption that is stolen prior to the migration could be decrypted once the quantum computer is available.
National Institute of Standards and Technology (NIST) sets cybersecurity standards for the United States and Canada.
Entropy is a measure of randomness in a system, and quantum entropy is randomness based on quantum sources. Qrypt uses sensitive measurement electronics on different types of quantum sources to produce true random numbers.
Where are random numbers used?
The most widespread application is in cryptography, as seeds to generate encryption keys to protect emails, websites, text messages and the internet.
What are encryption keys?
They are used to encrypt and decrypt data securely, and need to be protected just as much as the data they are intended to protect.