All posts by admin

pexels18338405

Prepare Now for the Quantum Computing Revolution

Prepare Now for the Quantum Computing Revolution

The events of September 11, 2001 taught many lessons about disaster preparedness and business continuity planning. One story that illustrates this well involves Morgan Stanley and their empty office space in New Jersey.

In the months leading up to 9/11, Morgan Stanley had set up a fully functioning office space in New Jersey, complete with technology infrastructure and workstations. Yet this office sat entirely unused each day, serving no immediate purpose.

That is until the Twin Towers fell. When Morgan Stanley’s main offices were destroyed, they were able to quickly reroute operations through the New Jersey office. Within just three days, their systems were back online with minimal disruption to the business.

This was only possible because of Morgan Stanley’s foresight in developing a backup plan for an unknown potential crisis. The unused office space was an investment in preparedness for the unexpected.

Today’s businesses face a looming technological crisis in the rise of quantum computing. Though still years away, quantum computers threaten to upend cybersecurity by rendering current encryption methods obsolete. Organizations need to start preparing now for this disruption to avoid being caught off guard.

Just like Morgan Stanley’s unused office space, adopting new quantum-safe encryption like IronCAP requires investment even before the threat materializes. But this upfront cost pales in comparison to the massive impacts on business operations if quantum computers emerge without adequate security preparations in place.

The events of 9/11 demonstrated the critical need for contingency planning and getting ahead of future risks. Companies that want to withstand the next technological shift would be wise to heed this lesson. By taking action now, they can maintain continuity when the landscape inevitably evolves. Don’t wait for quantum computers to arrive to prepare – the time is now.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

pexels5380664

The Future is Here: Commercially Available PQC Solutions for the Quantum Threat

The Future is Here: Commercially Available PQC Solutions for the Quantum Threat

The advent of quantum computers capable of breaking current public key cryptography is inevitable. While we may still be years away from this, forward-thinking companies are already developing quantum-safe solutions.

On a recent episode of the Root Causes podcast, Andrew Cheung of IronCAP discussed how his company is bringing post-quantum cryptography (PQC) to market today in various applications.

LISTEN HERE:
https://soundcloud.com/tim-callan/root-causes-330-end-to-end-pqc-in-use-today

IronCAP started working on PQC solutions in anticipation of the quantum threat over 5 years ago. They developed a toolkit that allows integrating PQC algorithms like Kyber and Dilithium into existing public key infrastructure.

Rather than wait for industry standards, IronCAP took the walled garden approach and implemented PQC within their own products first. For example, they now offer a PQC-enabled VPN and end-to-end encrypted email.

A project with cryptocurrency companies highlights how PQC can be applied selectively even with legacy infrastructure. While blockchain ledgers are quantum-safe, the private keys used to authorize transactions are vulnerable. IronCAP devised a way to implement PQC to protect these keys while maintaining compatibility with existing blockchains.

The key takeaway is that companies who recognize the quantum threat and control their own IT environments can start integrating PQC today. This allows high-value targets to mitigate the risk of “harvest now, decrypt later” attacks even before broad PQC standards and compatibility emerge.

So while fully universal PQC across the internet is still on the horizon, solutions for specific use cases are here today. IronCAP is leading the charge in commercially viable PQC, bringing quantum-safe security to early adopters.

As quantum computing advances, PQC will be crucial in all industries relying on data protection and integrity, like finance, healthcare, and defense. Companies have a choice – either leave sensitive data vulnerable to future decryption, or be proactive and integrate selective PQC safeguards now.

The message is clear: commercially viable PQC is available today thanks to innovative companies like IronCAP. The future of quantum-safe data protection is already here.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

World’s First #QuantumSafe End-to-End #EmailSecurity Service for Enterprises

For newsletter banner - 8
IronCAP™ X v2.0 was developed with simplicity and security in mind.

The underlying technology is patent-protected providing end-to-end security for your emails against attacks by any bad actor. From the time your email is sent until the time it is received and read by the authenticated recipient it remains fully encrypted without any decryption along the way. This guarantees complete privacy. Using National Institute of Standards and Technology (“NIST”) approved algorithms IronCAP™ X v2.0 is safe from attacks by sophisticated hackers including those using Quantum Computers.

Incorporating an IronCAP™ protected email digital signature ensures the sender is the real sender and not an impersonated one. This provides an extra layer of security which helps solve the infamous email phishing issue, which is the major way used by hackers to hijack emails gaining access to your computer system and holding you for ransom.

IronCAP X v2.0 is offered in two versions. A free version is available for personal usage and a business version is available with central management tools for IT managers can be subscribed at $9.95 per month or $99.95 per year.

For more information and a free download visit https://www.ironcap.ca/ironcap-x/

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Email #Encryption: Protecting Your Digital Communications with #IronCAP

EncryptionThe Importance of Email Encryption: Protecting Your Digital Communications

In today’s digital age, email has become an integral part of our personal and professional lives. It allows us to communicate with colleagues, friends, and family members seamlessly. However, with the increasing number of cyber threats and data breaches, it has become crucial to prioritize the security of our digital communications. One effective way to achieve this is by encrypting our email messages. In this blog post, we will explore the importance of email encryption and why it is essential in safeguarding our sensitive information.

1. Protecting Privacy:
Email encryption ensures the privacy and confidentiality of your messages. By encrypting your emails, you make them unreadable to anyone without the decryption key. This helps prevent unauthorized access and ensures that only the intended recipients can read your messages, keeping your sensitive information safe from prying eyes.

2. Safeguarding Sensitive Data:
Emails often contain sensitive data such as personal identification details, financial information, or confidential business data. Encrypting these messages adds an extra layer of protection, making it significantly more difficult for hackers or malicious actors to intercept and exploit your valuable information. It reduces the risk of identity theft, fraud, and unauthorized data disclosure.

3. Compliance with Regulations:
Many industries, such as healthcare and finance, are subject to strict data protection regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the General Data Protection Regulation (GDPR). Encrypting emails helps organizations comply with these regulations by ensuring the security and confidentiality of sensitive data during transmission.

4. Building Trust:
Encrypting your emails sends a powerful message to your recipients. It shows that you prioritize their privacy and security. Whether you’re a business communicating with clients or an individual exchanging personal information, email encryption builds trust and confidence in your ability to handle sensitive data responsibly.

5. Mitigating Email Interception:
Unencrypted emails can be intercepted during transmission, leaving them vulnerable to interception attacks like man-in-the-middle attacks. Email encryption utilizes advanced algorithms to protect your messages from interception and tampering, ensuring that your communication remains secure from origin to destination.

Conclusion:

In an era where cyber threats are rampant, email encryption has become more than just a recommended security practice—it is a necessity. By prioritizing the encryption of our email messages, we can protect our privacy, safeguard sensitive data, comply with regulations, build trust, and mitigate the risk of interception. Implementing email encryption solutions or using email providers that offer encryption capabilities is an essential step in ensuring the security and integrity of our digital communications. Let’s embrace email encryption to enhance our online safety and protect our valuable information.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Central Bank Digital Currency #Tourbillon #CBDC Project

CBDC
#Tourbillon, a new project to improve cyber resiliency, scalability, & privacy as a prototype CBDC.

The project has been launched by BIS Innovation Hub’s Swiss Centre and the goal is for the prototype to be finished by mid-2023, and BIS states results will be relevant to both wholesale and retail CBDC.

“To achieve cyber resiliency the project will be experimenting with #quantum-resistant #cryptography. For scalability the project will use an architecture compatible with distributed ledger technology, although not based on it. By making each transaction separate, the system resources scale linearly. The project seeks to verify the linear scalability of the design with realistic parameters.” FinExtra News reported.

Tourbillon aims to create privacy by providing it for the payment sender but not for the recipient. Regulatory and compliance checks will continue to apply.

Central bank digital currency (CBDC) is money that a central bank, like the Bank of England, can produce. It’s called digital (or electronic) because it isn’t physical money like notes and coins. It is in the form of an amount on a computer or similar device. A CBDC is different from cryptocurrency (also known as cryptoassets). Cryptocurrencies are NOT issued by a central bank. A CBDC is simply digital fiat, whereas cryptocurrencies are digital assets on a decentralised network.

Many countries are developing CBDCs, and some have even implemented them!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Is #RSA #Encryption vulnerable to #QuantumComputers?

Quantum (Mar 16 2023)
The robustness of RSA encryption has come under scrutiny

In the realm of digital security, encryption plays a vital role in safeguarding sensitive information. For decades, the RSA encryption algorithm has been widely used and trusted for its effectiveness. However, with the rise of quantum computers, the robustness of RSA encryption has come under scrutiny. In this blog post, we will explore the fundamentals of RSA encryption and discuss why it is vulnerable to quantum computing.

Understanding RSA Encryption:

RSA encryption, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman, is a widely adopted public-key encryption algorithm. It relies on the difficulty of factoring large numbers into their prime factors. The security of RSA encryption is based on the assumption that factoring large numbers is a computationally intensive task for classical computers.

Quantum Computing Threat:

Quantum computers, utilizing the principles of quantum mechanics, have the potential to revolutionize computing power. One of their most significant threats to classical encryption algorithms lies in their ability to perform Shor’s algorithm efficiently. Shor’s algorithm can factor large numbers exponentially faster than classical algorithms, posing a significant risk to RSA encryption.

Breaking RSA with Quantum Computers:

In RSA encryption, the public key consists of a product of two large prime numbers, while the private key relies on the knowledge of the prime factors. Shor’s algorithm can factorize these large numbers efficiently, thus compromising the security of RSA encryption. As quantum computers advance in power, they will be capable of breaking RSA encryption with ease.

Post-Quantum Cryptography:

To combat the vulnerability of RSA encryption to quantum computers, researchers are actively developing post-quantum cryptographic algorithms. These algorithms aim to withstand attacks from both classical and quantum computers. Promising alternatives include lattice-based, code-based, and multivariate cryptography, among others. The transition from RSA to post-quantum algorithms will require a careful and coordinated effort from organizations and service providers.

Conclusion:

While RSA encryption has served as a robust cryptographic tool for several decades, the emergence of quantum computers poses a significant threat to its security. As the power of quantum computers continues to advance, the need for post-quantum cryptographic algorithms becomes increasingly urgent. Organizations and individuals must remain vigilant and proactive in adopting and implementing these new encryption methods to ensure the long-term security of their sensitive data in a quantum-powered future.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#PostQuantum #IronCAP Toolkits now available – with NIST-approved PQC algorithms

IronCAPToolKits (May 18 2023)

Our IronCAP™ Toolkits can be used by vendors, for example, to build highly secure systems for blockchain security, IoT devices, data storage, remote access, encryption, digital signing, etc. Our NIST-approved post-quantum cryptography (PQC) technologies can protect our customers against ever-evolving illegitimate and malicious means of gaining access to their data, not only from computers today but also from quantum computers in the future. To ensure seamless integration, our IronCAP™ Toolkits is compliant with the OpenSSL, PKCS#11 and OpenPGP (RFC4880) industry standards.

Post-Quantum IronCAP™ Toolkits

Our IronCAP™ Toolkits allows vendors of a wide variety of vertical applications to easily transform their products to ensure safety against cyber attacks from not only the classical world of computers today but also against future attacks from quantum computers.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Don’t Let Your #Email Be a Sitting Duck: The Dangers of Sending #UnencryptedEmails

For newsletter banner - 7
Email has become the primary mode of communication in the digital age, both for personal and professional purposes. However, with the ease and convenience of sending emails comes the risk of exposing sensitive information to cybercriminals. One of the most significant risks of sending emails is sending unencrypted emails, which can leave your information vulnerable to interception, theft, and misuse. In this blog, we will discuss the dangers of sending unencrypted emails and the steps you can take to protect your sensitive data.

Unencrypted emails are like postcards; anyone who intercepts them can read their contents without much effort. In contrast, encrypted emails are like sealed letters, which require a key to open and read. Unencrypted emails travel across multiple servers to reach their intended recipient, and each server has access to the email’s contents. Hackers can use several techniques to intercept unencrypted emails, including phishing scams, man-in-the-middle attacks, and email hijacking. Once they have access to your emails, they can steal sensitive information like passwords, bank account details, and other personal information.

The consequences of sending unencrypted emails can be severe. For instance, cybercriminals can use the information they obtain to commit identity theft, financial fraud, and even blackmail. Additionally, businesses that send unencrypted emails risk violating data privacy regulations, which can result in hefty fines and damage to their reputation.

To protect yourself and your business from the dangers of unencrypted emails, consider using email encryption software. Encryption software encrypts your emails, making it difficult for hackers to intercept and read their contents. Some email clients, such as Gmail and Outlook, offer built-in encryption features that you can enable. However, it’s worth noting that the recipient must also have encryption software installed for the email to remain encrypted.

Finally, sending unencrypted emails can leave your information exposed to cybercriminals and put your privacy and security at risk. By using email encryption software, you can protect your sensitive data and ensure that your emails remain private and secure. Remember, an ounce of prevention is worth a pound of cure!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

The #quantumsecurity era is coming – here’s how to prepare for it

Quantum-2 (May 23 2023)

However, it also poses a significant threat to cybersecurity. With quantum computers, traditional encryption methods may become vulnerable, and sensitive data could be compromised. Therefore, it’s crucial for leaders to prepare for the quantum security era.

Firstly, leaders need to understand the potential implications of quantum computing on their organizations. They should assess which data and applications may be at risk, and the potential impact of a security breach. They must also consider the impact on their industry as a whole and stay updated on the latest developments in quantum technology.

Secondly, leaders should begin to explore quantum-resistant encryption methods. Post-quantum cryptography, which uses algorithms that are resistant to quantum attacks, is a promising solution. They can start by working with their IT teams and security experts to identify and prioritize areas that need to be strengthened, and invest in the necessary technology and infrastructure to implement these solutions.

Thirdly, leaders should consider partnering with experts in the field of quantum security. This includes collaborating with universities and research institutions that are at the forefront of quantum research. By working with experts, leaders can stay updated on the latest developments in the field and gain insights into how to implement quantum-resistant security measures.

Finally, leaders need to prioritize education and training for their employees. As quantum security measures become more widespread, it’s crucial that employees are trained on how to implement and use them effectively. This includes educating employees on the importance of strong passwords, two-factor authentication, and other security measures that can help protect sensitive data.

In conclusion, the quantum security era is approaching, and leaders must prepare to protect their organizations from potential threats. By understanding the implications of quantum computing, exploring quantum-resistant encryption methods, partnering with experts, and prioritizing education and training, leaders can safeguard their organizations and stay ahead of the curve in this rapidly evolving field.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

What if anyone could access your #bitcoinwallet?

Bitcoin (Apr 20 2023)

If the answer is yes, then that’s a game changer for #cryptocurrencies!

So how do you access a bitcoin wallet. Accessing a Bitcoin wallet requires issuing a transaction to move Bitcoin from the address at which it resides to a new address; to perform such a transaction, you need knowledge of the private key associated with the Bitcoin address. Looking at how the FBI retrieved the Bitcoin from the Colonial Pipeline Hackers, Joseph Steinberg makes the following comment …

“It is no secret that cryptocurrencies enable various types of criminal activity and facilitate money laundering and the unreported transfers of large sums of money; as a result, I have wondered for years if lawmakers and law enforcement seemingly “turning a blind eye” to much of the issue has not been the result of naiveite, but because governments have “back doors” into popular crypto networks; are various government bodies able to better trace transactions than is commonly believed, to exploit zero-day implementation vulnerabilities in the crypto networks themselves or in the communications infrastructure upon which the networks rely, or to crack private keys far faster than outsiders believe through the use of quantum computers more advanced than are publicly known to  exist? Could Satoshi Nakomoto even be some government agency somewhere? Whoever knows the answers to these questions will clearly not answer them to the public. (Of course, if the FBI has such capabilities, it would likely use them sparingly and ascribe any successes to other techniques – just as the Allies did not act on every piece of data obtained by hacking Enigma so as not to alert the Nazis to Enigma’s compromise.)”

Also, it’s not a secret that quantum computers will eventually be able to rapidly crack the asymmetric encryption that forms the heart of modern-day digital signatures, nor is it a secret that many blockchain implementations – including those utilized by several popular cryptocurrencies – rely on potentially quantum-vulnerable asymmetric encryption algorithms to establish and authenticate the “owners” of their respective per-ledge-address contents.

Cryptocurrencies like Bitcoin and others are developed on blockchain technologies. Though advanced and sophisticated, the arrival of quantum computers are posing a serious threat to the security of blockchains. The only solution is to transition to quantum-safe blockchains utilizing post-quantum cryptography.

What is a quantum-safe blockchain? Well let’s run through the basics first. A blockchain is a database that is shared among the nodes of a computer network and stores data electronically. The jewel crown of this innovative blockchain technology is that it ensures the fidelity and security of a record of data which does not require a trusted third party.

Now that we know what blockchain truly means and how secure it is, we must also know that blockchain end points are vulnerable to quantum hacking. CISOs today and even blockchain experts are well aware of the fast-approaching quantum threats. The official Bitcoin website states that Bitcoin is vulnerable to quantum hacking just as most systems relying on cryptography in general are, including traditional banking systems. Some of the most recent hacks include $300M and $650M losses in cryptocurrencies that resulted from digital signature failures.

Besides cryptocurrency trading, the blockchain is a revolutionary technology that has many use cases. The blockchain is changing the face of businesses and governments today. It can be used for asset traceability, supply chain, trade payments, global payments, banking systems, voting and even digital identity. Using this very technology, new business models are evolving and disrupting the existing ones.

Just like all things on the internet, the blockchain requires security against quantum hacking. This is where IronCAP’s™ unique technology comes to use. We are developing the world’s first Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for Metaverse, De-centralized Finance (DeFi) and more. This best-in-class quantum-safe blockchain can protect against cyber adversaries, including future quantum attacks. A revolutionary, state-of-the-art, quantum-safe blockchain has endless applications and use cases for every business.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.