if using more two or more encryption algorithms together how do we compute the strength of the final encryption?

if using more two or more encryption algorithms together how do we compute the strength of the final encryption?
And how would the application on quantum computers
the first two tables I believe to be true/correct – is that correct?
the th… Continue reading if using more two or more encryption algorithms together how do we compute the strength of the final encryption?

Whch Cryptographic Standard ensures cryptographic agility and good adapotion

Which Cryptographic Message Standards are recommended to ensure cryptographic agility in the future and good adapotion trough different programming languages (.NET and Go)?
(PublicKey with authenticated symetric encryption)
I doesn’t want … Continue reading Whch Cryptographic Standard ensures cryptographic agility and good adapotion

Will VPNs Continue Losing the Battle to Keep Data Secure? 

Virtual private networks (VPNs) are under attack and hackers may be winning the battle, using exploits that are becoming all-too-common. While many may argue that VPNs are salvageable and can be returned to their once-lofty status of protecting data, … Continue reading Will VPNs Continue Losing the Battle to Keep Data Secure? 

Creating X509 certificate in C using post-quantum public key algorithm?

I’m trying to implement a self signed x509 certificate that uses a post-quantum (PQ) public key algorithm as the public key algorithm. I looked at the openssl library in c, and the way it’s done using RSA. I’m essentially try… Continue reading Creating X509 certificate in C using post-quantum public key algorithm?

2020: Machine Learning, Post Quantum Crypto & Zero Trust

Welcome to a digital identity project in 2020! You’ll be expected to have a plan for post-quantum cryptography.  Your network will be littered with “zero trust” buzz words, that will make you suspect everyone, everything and every transaction.&#16… Continue reading 2020: Machine Learning, Post Quantum Crypto & Zero Trust