Author: Mark Jones

Categories : Data Security            Leave a comment           

In order to protect our data in the medium term the algorithms and protocols used must be resistant to developments in Quantum Computing that could result in many conventional public key algorithms becoming breakable – that is, reversible from the public key. As new algorithms and mechanisms are proposed how should they be safely included in systems without ultimately undermining security because of their immaturity? Several areas of mathematics are being considered as possibly resistant to quantum computer attacks. These […]

Categories : Data Security            Leave a comment           

In order to protect our data in the medium term the algorithms and protocols used must be resistant to developments in Quantum Computing that could result in many conventional public key algorithms becoming breakable – that is, reversible from the public key. One of the uses of public key cryptography is Key Agreement (also known as Key Exchange), which typically uses the Diffie-Hellman mechanism, and its Elliptic Curve equivalents. Replacement mechanisms have been proposed for Diffie-Hellman, notably New Hope, as […]