Skip to content

entropy

Post Quantum Algorithm

PQC is here, but do not get distracted

Quantum computing poses a significant threat to the current Public Key Infrastructure (PKI) through Shor’s Algorithm [1], which can efficiently factorize large numbers, potentially breaking widely used encryption schemes.

Zero Trust – How a Quantum Random Number Meets These Objectives

In the ever-evolving landscape of cybersecurity, the critical role of entropy as a source for cryptographic systems is often understated. Entropy, in the context of cryptography, refers to the randomness collected by a computer system for use in cryptographic algorithms.

Why it’s time to re-think your source of entropy

In the ever-evolving landscape of cybersecurity, the critical role of entropy as a source for cryptographic systems is often understated. Entropy, in the context of cryptography, refers to the randomness collected by a computer system for use in cryptographic algorithms.