3 min read
Quantum Computing and Cryptography Infrastructure Investments
The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...
3 min read
The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...
5 min read
While the science and technology behind quantum computers is extremely complex, their computing power has been steadily increasing, from 3 qubits in...
5 min read
In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...
3 min read
The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...
3 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.
5 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
5 min read
“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...
4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
3 min read
Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...