Posts tagged with: PKI

Study: Not All Secure Quantum Message Authentication Codes are Better than Classical Codes

Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources Abstract +  In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires...

Cloud Security for Quantum Computing & What’s Your Crypto Plan?

How to Secure Quantum Computing in the Cloud Key points… +  Quantum computing will likely arrive sooner than expected. 2020 has seen many leaps in the advance of quantum computing,...

NIST Publishes Two Digital Signature Schemes: Good Enough for ICS or SCADA Security?

Recommendation for Stateful Hash-Based Signature Schemes: NIST SP 800-208 Read More [PDF]… NIST announces the release of Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. This publication supplements FIPS 186 by approving the...

Quantum Computing has Implications for Security, What are They?

Security Implications Of Quantum Computing Key points… +  For public key cryptography, such as RSA and ECC (Elliptic-Curve Cryptography), quantum computing represents an existential event. A fully developed quantum computer...

Swapping Out Your Cryptographic Infrastructure: Complex, Costly, Herculean Effort

Swapping Out Your Cryptographic Infrastructure: Complex, Costly, Herculean Effort Informative piece if you have a limited understanding of how data is kept secure. Punctuates the need to get moving on...

Your Organization’s Key to Security May be Your Crypto-Agility

Your Organization’s Key to Security May be Your Crypto-Agility Is Critical Infrastructure Ready for Quantum? Points to note… +  Organizations with mission-critical security requirements can strengthen and start future-proofing their...