CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts

A wide range of organizations from defence to banking are preparing for ‘Y2Q’, the moment when a sufficiently developed quantum computer emerges that can break today’s encryption. As a trusted cyber security supplier to ultra high net worth individuals… Continue reading CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts

Are "non-quantum" cryptographically secure random number generators vulnerable to quantum attacks? [closed]

These days a lot of vendors are agressively marketing their Quantum Random Number Generators (QRNG), citing emerging/potential threat from quantum computers. I was wondering, are the existing state-of-the-art CSRNGs (hardware or software) … Continue reading Are "non-quantum" cryptographically secure random number generators vulnerable to quantum attacks? [closed]

Why are LMS and XMSS no candidates in the Post-Quantum Cryptography Standardization process?

Why are Leighton-Micali Signature Scheme (LMS) and eXtended Merkle Signature Scheme (XMSS) no candidates in the NIST Post-Quantum Cryptography Standardization process?
Both are mentioned in the final draft of Recommendation for Stateful Ha… Continue reading Why are LMS and XMSS no candidates in the Post-Quantum Cryptography Standardization process?

What is the simplest post-quantum asymmetric cryptographic algorithm?

This question has been burning in the back of my head for the past few days, and a quick Google search doesn’t yield any usable results.
As the title suggests: What is the easiest-to-understand post-quantum asymmetric cryptographic algorit… Continue reading What is the simplest post-quantum asymmetric cryptographic algorithm?

if using more two or more encryption algorithms together how do we compute the strength of the final encryption?

if using more two or more encryption algorithms together how do we compute the strength of the final encryption?
And how would the application on quantum computers
the first two tables I believe to be true/correct – is that correct?
the th… Continue reading if using more two or more encryption algorithms together how do we compute the strength of the final encryption?

Whch Cryptographic Standard ensures cryptographic agility and good adapotion

Which Cryptographic Message Standards are recommended to ensure cryptographic agility in the future and good adapotion trough different programming languages (.NET and Go)?
(PublicKey with authenticated symetric encryption)
I doesn’t want … Continue reading Whch Cryptographic Standard ensures cryptographic agility and good adapotion