News

Quantum computing has been hailed as the next frontier in technology, capable of solving problems that classical computers ...
Quantum computing is a catalyst for rethinking how organizations govern, secure and manage cryptographic systems.
As NIST rolls out advanced PQC standards to address the ‘Harvest now, decrypt later’ threat, a new report suggests that a ...
Post-quantum cryptography – algorithms designed to be secure against classical and quantum computer attacks – is the response ...
From anonymization algorithms to zero-knowledge proofs, our no-nonsense glossary unpacks the encryption keys, clean rooms and ...
Increasing computing power will soon make existing encryption algorithms ineffective. Here’s how the industry is responding and how your agency can benefit from new encryption innovations today.
Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that ...
Paul Smith-Goodson explores the end-to-end features and capabilities of IBM Quantum Safe Technology and examines its usefulness in identifying non-quantum-safe encryption and replacing them with ...
Performance Overhead: Encryption processes can slow down devices, especially with resource-intensive algorithms. Data Recovery Issues: Loss of encryption keys can make data permanently inaccessible.
More by Sophie Bushwick This article was originally published with the title “New Encryption System Protects Data from Quantum Computers” in SA Space & Physics Vol. 2 No. 6 (December 2019) ...
The algorithm, sometimes referred to as single DES, uses a 56-bit key to encrypt blocks of data, and can produce up to 72 trillion unique keys.