Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

I’m working on designing a VPN that is post-quantum safe while avoiding detection that it uses post-quantum cryptography. The goal is to make the use of post-quantum cryptography indistinguishable to an eavesdropper, who might otherwise st… Continue reading Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

Impact of quantum computers on password security [closed]

I wrote an article on the impacts of sufficiently capable quantum computers on password strength and attacks.
The basic premise is that Grover’s algorithm halves the protective strength of password hashes and passwords, plus any additional… Continue reading Impact of quantum computers on password security [closed]

What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks? [closed]

This thread is for how ssh-keygen relates to quantum computing attacks.
What are the strengths and weaknesses of the ssh-keygen algorithms as related to quantum computing, which from my understanding will be able to potentially crack them … Continue reading What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks? [closed]

CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts

A wide range of organizations from defence to banking are preparing for ‘Y2Q’, the moment when a sufficiently developed quantum computer emerges that can break today’s encryption. As a trusted cyber security supplier to ultra high net worth individuals… Continue reading CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts