Einstein 1921 Portrait

The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt

SSL, the team behind Lightway’s cryptography | When we created Lightway, our groundbreaking VPN protocol, security and privacy were our top priorities. We chose to incorporate wolfSSL, a well-established, open-source cryptography library that has been extensively vetted by third parties, including against the FIPS 140-2 standard.  Source: ExpressVPN.  SSL, the team behind Lightway’s cryptography…

NSA Updates FAQ on Post-Quantum Cybersecurity | The National Security Agency (NSA) released a frequently asked questions document on Quantum Computing and Post-Quantum Cryptography. The document answers several questions such as “What is a quantum computer?” and “What makes one cryptographically relevant?” Further information is provided on the Commercial National Security Algorithm (CNSA) Suite, the Commercial Solutions for Classified (CSfC) Program, the National Information Assurance Partnership (NIAP), and future algorithms and cryptography.  Source: quantum.gov.   NSA Updates FAQ on Post-Quantum Cybersecurity…

BUT opens a unique laboratory of quantum security | As of today, the new laboratory with the so-called quantum communication infrastructure is available to experts from the Faculty of Electrical Engineering and Communication of the Brno University of Technology. The laboratory will enable scientists to work on next-generation computer networks that will also be protected from quantum computer attacks, to which the vast majority of current networks, including the Internet, are vulnerable.  Source: BUT.  BUT opens a unique laboratory of quantum security…

Barcelona Supercomputing Center Powers Encrypted Neural Networks with Intel Tech | Homomorphic encryption provides two extraordinary benefits: first, it has the potential to be secure against intrusion by even quantum computers; second, it allows users to use the data for computation without necessitating decryption, enabling offload of secure data to commercial clouds and other external locations. However – as researchers from Intel and the Barcelona Supercomputing Center (BSC) explained – homomorphic encryption “is not exempt from drawbacks that render it currently impractical in many scenarios,” including that “the size of the data increases fiercely when encrypted,” limiting its application for large neural networks.   Source: datanami.   Barcelona Supercomputing Center Powers Encrypted Neural Networks with Intel Tech…

AWS researcher merges the power of two quantum computers to help make cryptography keys stronger | Combining the capabilities of two quantum computers, a researcher from the AWS Centre for Quantum Computing has come up with a new way to create truly random numbers that are necessary to protect sensitive data online, ranging from blockchain ledgers to government secrets.   Source: ZDnet.   AWS researcher merges the power of two quantum computers to help make cryptography keys stronger…

Amazon is Developing Revolutionary Quantum Technology | Random numbers are the basis of cryptography keys. These keys can in turn be used to encrypt critical data, by encoding information into an unreadable mush for anyone but those who are equipped with the appropriate key to decode the message. The more random the key is, the harder it is to crack by a malicious actor trying to get their hands on the data.   Source: iHLS.   Amazon is Developing Revolutionary Quantum Technology…

ADVA leads AI-NET-PROTECT project to build resilient and secure private networks | ADVA (FSE: ADV) today announced that it’s leading the AI-NET-PROTECT project, driving automated resilience and security in private networks and critical infrastructure. The project will address urgent challenges, including the threat of quantum computing to break the encryption that businesses and governments currently rely on to ensure data confidentiality and availability. AI-NET-PROTECT is a consortium of European industry and research partners working together to develop open and scalable network architectures with AI-based management and network protection. The initiative will develop technology that leverages real-time telemetry and intelligent control, helping to increase automation, simplify operations and safeguard sensitive information.  Source: ADVA.  ADVA leads AI-NET-PROTECT project to build resilient and secure private networks…

The Post-Quantum Cryptography World Is Coming: Here’s How to Prepare | Have you ever sat in traffic and cursed the town planners? For years, you may have watched as the town approved new subdivisions and stores along the roads you drive often. And you wondered when they would add a new lane, extend a road or install a new stoplight. But think about this: If you’re skipping over news articles about quantum computing and post-quantum cryptography, you’re doing the same thing in relation to your business that town planners seem to do relative to new construction — waiting for the negative impacts before fixing the issue.  Source: securityIntelligence.   The Post-Quantum Cryptography World Is Coming: Here’s How to Prepare…