Posts tagged with "PKE"

Solution Highlight: Quantum Xchange’s Phio Trusted Xchange (TX)
Blog | Endpoint Protection · 16. May 2023
With the exponential rise of quantum computing in recent years, current encryption algorithms used to secure our data and communications networks are at risk of becoming obsolete. Using the Shor algorithm, the power of a quantum computer will be able to break modern encryption standards sparking the largest cryptographic migration in the history of computing – requiring organizations to replace legacy encryption with quantum-safe cryptography.

Quantum Computing | Time to Get Post-Quantum Ready
Blog | Endpoint Protection · 21. March 2023
As we discussed in a recent blog post, quantum computing, like any major technological advance, will bring a lot of good things, but it also poses a serious risk to the security of our communications, making them vulnerable to new quantum-powered attacks performed by state-sponsored cybercriminals. While most technologies used to secure our data were believed to be secure and “unbreakable” some years ago, they will certainly not be in the years to come. Quantum computing is accelerating...