News

Quantum computing presents an emerging threat to Switzerland’s financial sector, but despite its growing relevance, there is currently no dedicated quantum-safe framework.
There's one day in particular that every security researcher has marked in their diary, however, and that's "Q-Day" – the ...
The timeline for the development of CRQCs is uncertain, which can cause many leaders to put preparation on the back burner. But delaying preparation could potentially expose organizations to ...
Students are introduced to cryptography, the process of hiding or encoding messages so only intended recipients can read them.
Political Threats: These entail the absence of a cohesive and responsive political system that meets the aspirations of the people, alongside a nearly total lack of indicators of democracy and good ...
The key to modern asymmetric cryptography is to create an equation that is easy to solve in one direction but difficult to reverse by an adversary in the other direction. Traditionally, this was done ...
Mathematicians suspected they could use Fermat’s work to break encryption—and Böck demonstrated that case. Modern encryption systems are based on difficult math problems. They work like a ...
Enter Post-Quantum Cryptography (PQC) which is our path to quantum safe security. In this blog, we’ll explore the background of PQC, the progress made by NIST and other organizations, and why ...