Category Archives: Cybersecurity

What are the risks of #QuantumComputers and how do they work?

Quantum computers are not yet in general use, but they’ve been under development for decades.

Quantum computers are not yet in general use, though they’ve been under development for several decades. Quantum computing works with quantum bits (qubits), which are like regular bits but can be in multiple states at once. While it’s difficult to explain exactly how this works, the basic idea is that qubits can represent both 0 and 1 at the same time, giving them an exponential advantage over traditional binary systems. They’re also very fast—a quantum computer with just 300 qubits could theoretically perform calculations millions of times faster than a supercomputer running on classical logic.

In the world of computing, quantum computing is a game-changer. While traditional computers use binary bits to store information in “yes” or “no” states, quantum computers use qubits that can exist in both states simultaneously. This allows them to perform multiple calculations at once and do so much faster than traditional computers. But while quantum computing has many promising applications, such as developing new drugs and materials, it also presents serious risks for businesses operating in regulated industries—and not just because of its potential impact on encryption methods used to protect data stored on cloud servers.

Creating a functional quantum computer requires complex physical infrastructure.

Physically, the hardware of a functional quantum computer is complex. In order to be able to run computations, it must be cooled to extremely low temperatures and isolated from vibrations and other disturbances. These requirements make it difficult to create large-scale quantum computers as they require an enormous amount of energy and cooling capability. Additionally, these computers need enough memory capabilities in order to communicate with each other and process large amounts of data at once.

A functional quantum computer could be used to break existing encryption methods, potentially exposing much of the world’s data to theft and fraud.

Quantum computers could be used to break encryption methods, potentially exposing much of the world’s data to theft and fraud.

A functional quantum computer would be able to break the encryption algorithms used in most current day communications, including emails and banking transactions. This means that any information encrypted using today’s methods would no longer be secure.

As businesses adopt cloud computing as their primary delivery model for IT services, the security of data stored in cloud environments is of paramount importance.

As businesses adopt cloud computing as their primary delivery model for IT services, the security of data stored in cloud environments is of paramount importance. The cloud offers a tempting target for hackers because it has a large attack surface and is highly vulnerable to all the same types of attacks as a traditional network. But there are also new types of attacks that could be launched against clouds, including quantum computing-based attacks.

The prospect of quantum computing being able to break encryption within the next decade or so represents a risk that companies can’t afford to ignore.

The prospect of quantum computing being able to break encryption within the next decade or so represents a risk that companies can’t afford to ignore.

Data encryption is the only way to protect data from being breached, but quantum computing may be able destroy this protection within our lifetimes. Quantum computers are incredibly fast at solving certain types of problems, and they could theoretically be used for good or evil. If you’re not concerned about the risks associated with quantum computing, you should be!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Businesses must address the risks of #QuantumComputing NOW!

The #QuantumThreat is real, and needs to be on the agenda of every company board!

We are still in the early days of quantum computing technology, but it’s clear that this is an area that businesses should be paying attention to. The potential threats and risks associated with quantum computing are serious, but they can be mitigated with proper planning and preparation. It’s time for companies to start taking steps now in order to protect themselves from future problems—and if you don’t believe us, just ask Google!

Remember, quantum computers already exist. And, while today’s commercially-created quantum machines are nowhere near powerful enough to approach quantum supremacy, absolutely nobody knows the true extent of the quantum capabilities of all of the technologically-advanced governments around the world.

The risks of quantum computing are real and growing. As a business operating in a regulated industry, you may think that the threat of quantum computing is theoretical or limited to other industries such as finance or research. However, this is not the case—the risk of quantum computing will affect every industry.

Quantum computers are coming and they’re going to change the way we work. If you’re an executive or a business owner, it’s important that you understand the risks associated with quantum computing and begin taking steps now in order to prepare for what lies ahead.

To get started, consider these tips:

  • Know your options (and don’t be afraid to explore new ones). You may think that your company is too small or too large for quantum-safe encryption, but if this isn’t true then it’s worth exploring all of your options before making assumptions about what can be done.
  • There may also be other technologies available that can help protect against quantum attacks, such as hardware security modules (HSMs). HSM devices connect directly into a company’s systems via USB ports in order to provide additional security measures against any type of cyberattack—including those from quantum computers!
  • It’s important not only that companies understand their own needs when it comes time for new technology but also how these needs fit into larger trends happening within industries like healthcare where patients’ privacy concerns need addressing urgently before any potential interference occurs due specifically because they were unprepared beforehand.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why haven’t we managed to curtail the #Ransomware menace?

#Ransomware is the biggest cybersecurity threat facing the world today.

Ransomware is the biggest cybersecurity threat facing the world today, with the potential to significantly affect whole societies and economies – and the attacks are unrelenting, the head of the National Cyber Security Centre (NCSC) has warned.

“Even with a war raging in Ukraine – the biggest global cyber threat we still face is ransomware. That tells you something of the scale of the problem. Ransomware attacks strike hard and fast. They are evolving rapidly, they are all-pervasive, they’re increasingly offered by gangs as a service, lowering the bar for entry into cyber crime,” said Lindy Cameron, CEO of the NCSC In a speech at Tel Aviv Cyber Week. She added that the NCSC has dealt with “nationally significant incidents” along with hundreds of general cyber incidents that “affect the UK more widely every year”.

Working alongside other law enforcement agencies, Cameron said that the NCSC is working to understand the criminal system that helps drive ransomware attacks – and how the nature of ransomware gangs and the techniques they’re using to facilitate ransomware campaigns continue to evolve.

“We want to make ransomware an unprofitable and unattractive business,” said Cameron, who argued it’s not all doom and gloom when it comes to cybersecurity, going on to detail how the NCSC’s Active Cyber Defence Program has helped to disrupt cyberattacks targeting citizens.

According to newly released figures from cybersecurity company WatchGuard, the volume of ransomware has risen significantly with the amount of detected activity in the first quarter of 2022 more than three times what was detected during the same period last year. The report suggests that the emergence of aggressive ransomware and extortion operations including  #LAPSUS$ and #BlackCat are behind what’s described as “an ever-increasing ransomware and cyber-extortion threat landscape.”

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why does #Blockchain need to be #QuantumSafe?

Blockchain is currently extremely vulnerable!

01 Communique Laboratory Inc. has been commissioned to develop the World’s First Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for the Metaverse, De-centralized Finance (DeFi). It is expected that this best-in-class quantum-safe blockchain will be resilient against cyber adversaries, including quantum attacks.

Blockchain technology is vulnerable to cyber-attacks, including quantum threats. A recent crypto hack reported a loss of over $300 million due to hackers forging a wrong signature to fake a transaction1. These hacks have now become commonplace and it is anticipated that the introduction of quantum computing will increase them dramatically.

After an extensive global search, a consortium of highly successful crypto experts has selected the Company as their technology partner and Post-Quantum Cryptography (PQC) provider. The consortium (Talent Summit) is pursuing the new blockchain aggressively and is planning a Proof-of-Concept (PoC) within three months. The PoC of this new venture is the first step towards protecting the de-centralized eco-system.

“01 has taken a minority position in Talent Summit and in addition will be compensated for the development project by way of a payment of $250,000 cash plus a 10% royalty for the ongoing share of the “Tokens” per transaction,” said Andrew Cheung, the President and CEO of 01 Communique. 01 will protect the integrity of this state-of-the-art blockchain by using its patent-protected, quantum-safe, IronCAP™ technology. In addition to being quantum-safe and supporting smart contracts, this new blockchain is aiming at high-performance with the ability to process tens of thousands of transactions/second (TPS). “This revolutionary blockchain is essentially a transformation of the proven Solana blockchain into a quantum-safe version to be incorporated in Tokens, NFTs, Smart Contracts for Metaverse, DeFi, and more”, said Andrew Cheung.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Is IBM accelerating the #quantumcomputer development trajectory?

IBM has unveiled 4 new quantum processors that it plans to use in a quantum supercomputer!

Last week IBM updated its quantum computing roadmap for the 3rd time since the first one was published. In this new roadmap, IBM has provided new tools for kernel developers, algorithm developers, and model developers. These developments all require new hardware, software, and new architecture.

The roadmap suggests that IBM will accelerate quantum’s expected trajectory by developing quantum processors that have the potential to scale to hundreds of thousands of qubits several years earlier than expected – and that’s a problem for current security, when it’s not quantum safe!

If IBM’s roadmap is implemented, it will change the landscape of quantum computing. 10 years ago, CPU-centric supercomputing was the exclusive domain of government and researchers for solving large and complex scientific problems. Since then, it has been democratized and transformed into various types of AI-centric supercomputing used in almost every industry today.

This roadmap is IBM’s plan to create a new family of quantum processors, software, and services that will lead to the realization of the next generation of supercomputers, a quantum-centric supercomputer. The combined resources of quantum processors, CPUs, and GPUs are expected to solve some of the world’s most challenging problems. In short the Quantum timeline is no longer science fiction – it now looks like this …

  • 2023 – Condor with 1121 Qubits
  • 2024 – Flamingo with 1386 Qubits
  • 2025 – Kookaburra with 4158+ Qubits
  • 2026 onward – hundreds of thousands Qubits!

… and there’s the problem, all encryption is now rendered useless! – That’s why The White House has announced that President Joe Biden has signed a National Security Memorandum (NSM) aimed at maintaining U.S. leadership in quantum information sciences and to mitigate the risks of quantum computing to the Nation’s security. “A cryptanalytically relevant quantum computer could jeopardize civilian and military communications as well as undermine supervisory and control systems for critical infrastructure,” said GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS. “The No. 1 defense against this quantum computing threat is to implement quantum-resistant cryptography on our most important systems.”

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Who is the #Ransomware Bad Guy?

So what is the biggest cause of Ransomware? Who’s the culprit? Email #Phishing has to be the answer!

Global Ransomware damage costs are predicted to exceed $265 Billion by 2031 (cybersecurityventures.com) Ransomware has been topping headline news on a daily basis and is becoming our No. 1 “cyber-enemy”. According to Harvard Business Review in May 2021, ransomware attacks were up 150% over the previous year. The amount paid by victims of these attacks increased more than 300% in 2020. This massive uptrend is further fuelled by accelerated digitalisation creating fertile soil for such attacks. The risk of data exposure will only grow given that remote workers’ personal devices are more vulnerable. According to the Cybercrime Magazine, ransomware damage costs are predicted to exceed USD265B annually and attacking a business, consumer, or device every 2 seconds by 203

Governments and critical infrastructure are not the only targets, ransomware attackers are less concerned about the industry and more focused on scope and scale. They go after large enterprise networks to secure the biggest possible ransom. Therefore, big enterprises e.g., banks, manufacturers and even high-tech companies and cybersecurity providers themselves are popular targets.

We believe enterprises should adopt a holistic approach, addressing the essential aspects including enhancing awareness and governance, while adopting suitable and robust technology solutions that best suit the technical environment that support the entity’s business operations. The adoption of true end-to-end encryption would be a key preventive measure, and leveraging the latest verifiable digital credentials would provide the average email user the means to verify the purported identity of the party sending the email.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

$325 million in #cryptocurrency disappears after an error on #GitHub

Imagine a security flaw that was fixed but then apparently not applied to the live application – as a result it was hacked!

The decentralized finance (DeFi) platform Wormhole became the victim of the largest cryptocurrency theft this year, and among the top five largest crypto hacks of all time, when an attacker exploited a security flaw to make off with close to $325 million!

The attack seems to have resulted from a recent update to the project’s GitHub repository, which revealed a fix to a bug that had not yet been deployed to the project itself. The attack was noticed when a post from the Wormhole Twitter account announced that the network was being taken “down for maintenance” while a potential exploit was investigated. A later post from Wormhole confirmed the hack and the amount stolen.

Shortly after the attack, the Wormhole team also offered the hacker a $10 million bounty to return the funds, which was embedded as text in a transaction sent to the attacker’s Ethereum wallet address.

Wormhole provides a service known as a “bridge” between blockchains, essentially an escrow system that allows one type of cryptocurrency to be deposited in order to create assets in another cryptocurrency. This allows a person or entity with holdings in one cryptocurrency to make trades and purchases using another, somewhat like being able to fund a bank account in dollars and then use a bank card to buy something priced in euros.

To carry out the attack, the attacker managed to forge a valid signature for a transaction that allowed them to freely mint 120,000 wETH — a “wrapped” Ethereum equivalent on the Solana blockchain, with value equivalent to $325 million at the time of the theft — without first inputting an equivalent amount. This was then exchanged for around $250 million in Ethereum that was sent from Wormhole to the hackers’ account, effectively liquidating a large amount of the platform’s Ethereum funds that were being held as collateral for transactions on the Solana blockchain.

Open-source code commits show that code that would have fixed this vulnerability was written and uploaded to the Wormhole GitHub repository on the day of the attack. Just hours later, the vulnerability was exploited by the hacker, suggesting that the updates had not yet been applied to the production application.

Due to the nature of cross-chain applications, the attack temporarily left a huge deficit between the amount of wrapped Ethereum and regular Ethereum held in the Wormhole bridge — as if the collateral asset backing a loan had suddenly disappeared. According to Forbes, the attack caused a 10 percent drop in the value of the Solana cryptocurrency in the aftermath of the hack.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

What if anyone could access your bitcoin wallet?

If the answer is yes, then that’s a game changer for cryptocurrencies!

So how do you access a bitcoin wallet. Accessing a Bitcoin wallet requires issuing a transaction to move Bitcoin from the address at which it resides to a new address; to perform such a transaction, you need knowledge of the private key associated with the Bitcoin address. Looking at how the FBI retrieved the Bitcoin from the Colonial Pipeline Hackers, Joseph Steinberg makes the following comment …

“It is no secret that cryptocurrencies enable various types of criminal activity and facilitate money laundering and the unreported transfers of large sums of money; as a result, I have wondered for years if lawmakers and law enforcement seemingly “turning a blind eye” to much of the issue has not been the result of naiveite, but because governments have “back doors” into popular crypto networks; are various government bodies able to better trace transactions than is commonly believed, to exploit zero-day implementation vulnerabilities in the crypto networks themselves or in the communications infrastructure upon which the networks rely, or to crack private keys far faster than outsiders believe through the use of quantum computers more advanced than are publicly known to  exist? Could Satoshi Nakomoto even be some government agency somewhere? Whoever knows the answers to these questions will clearly not answer them to the public. (Of course, if the FBI has such capabilities, it would likely use them sparingly and ascribe any successes to other techniques – just as the Allies did not act on every piece of data obtained by hacking Enigma so as not to alert the Nazis to Enigma’s compromise.)”

Also, it’s not a secret that quantum computers will eventually be able to rapidly crack the asymmetric encryption that forms the heart of modern-day digital signatures, nor is it a secret that many blockchain implementations – including those utilized by several popular cryptocurrencies – rely on potentially quantum-vulnerable asymmetric encryption algorithms to establish and authenticate the “owners” of their respective per-ledge-address contents.

Cryptocurrencies like Bitcoin and others are developed on blockchain technologies. Though advanced and sophisticated, the arrival of quantum computers are posing a serious threat to the security of blockchains. The only solution is to transition to quantum-safe blockchains utilizing post-quantum cryptography.

What is a quantum-safe blockchain? Well let’s run through the basics first. A blockchain is a database that is shared among the nodes of a computer network and stores data electronically. The jewel crown of this innovative blockchain technology is that it ensures the fidelity and security of a record of data which does not require a trusted third party.

Now that we know what blockchain truly means and how secure it is, we must also know that blockchain end points are vulnerable to quantum hacking. CISOs today and even blockchain experts are well aware of the fast-approaching quantum threats. The official Bitcoin website states that Bitcoin is vulnerable to quantum hacking just as most systems relying on cryptography in general are, including traditional banking systems. Some of the most recent hacks include $300M and $650M losses in cryptocurrencies that resulted from digital signature failures.

Besides cryptocurrency trading, the blockchain is a revolutionary technology that has many use cases. The blockchain is changing the face of businesses and governments today. It can be used for asset traceability, supply chain, trade payments, global payments, banking systems, voting and even digital identity. Using this very technology, new business models are evolving and disrupting the existing ones.

Just like all things on the internet, the blockchain requires security against quantum hacking. This is where IronCAP’s™ unique technology comes to use. We are developing the world’s first Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for Metaverse, De-centralized Finance (DeFi) and more. This best-in-class quantum-safe blockchain can protect against cyber adversaries, including future quantum attacks. A revolutionary, state-of-the-art, quantum-safe blockchain has endless applications and use cases for every business.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why did President Biden Sign a Memo to Combat Quantum Computing Threat?

This is a very good question … and at IronCAP™ we know the answer!

Finally, everyone is waking up to the fact that quantum computers are now a threat to security! There is a real and present danger. A quantum computer of sufficient size and sophistication( also known as a cryptanalytically relevant quantum computer) will be capable of breaking much of the public-key cryptography used on digital systems throughout  the world!

The White House has announced that President Joe Biden has signed a National Security Memorandum (NSM) aimed at maintaining U.S. leadership in quantum information sciences and to mitigate the risks of quantum computing to the Nation’s security.

“Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems” – also known as NSM-10 – directs U.S. Government agencies to migrate vulnerable cryptographic systems to quantum-resistant cryptography as part of multi-year effort. As the National Manager for National Security Systems, the Director of NSA will oversee this process across the 50-plus government departments and agencies using National Security Systems (NSS) – systems that contain classified information or are otherwise critical to military or intelligence operations.

“A cryptanalytically relevant quantum computer could jeopardize civilian and military communications as well as undermine supervisory and control systems for critical infrastructure,” said GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS. “The No. 1 defense against this quantum computing threat is to implement quantum-resistant cryptography on our most important systems.”

While NSA will spearhead many of the tasks in NSM-10 to ensure NSS are quantum resistant, the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) will ensure U.S. critical infrastructure and other U.S. Government systems also move toward quantum-resistant cryptography.

“Implementing approved quantum-resistant cryptographic solutions across all of our systems will not happen overnight, but it’s critical that we chart a path to get there considering the potential threat of quantum computing,” said Rob Joyce, NSA Cybersecurity Director and Deputy National Manager for National Security Systems.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Industry adopts Quantum-Safe Encryption

It is disheartening to watch the global crisis these days.  Nevertheless, it is critical we address today’s encryption and IronCAP™ wants to educate people about the importance of cybersecurity, now more than ever.

Cyberattacks often spiked with military actions. The risk of cyberattacks now is very high and rising.  A slew of hackings have occurred in just the past two months. Recent victims include Samsung, gaming giant UbiSoft and the world’s largest GPU producer, Nvidia. Some analysts claimed that the Nvidia hack was a “national security disaster”.  In fact, every country is on high alert for cyberattacks now.  They are watching not only attacks posed by classical computers but also those posed by quantum computers.  They definitely need to ramp up their cyber defenses.

You may think that commercial quantum computers are still far away.  Well, you will realize you are wrong if you go on to read.  As per reports from March 4th 2022, The White House is concerned over the threat raised by post-quantum computing.  It recently released a National Security Memorandum which have huge implications for quantum technology and quantum security for the world.  Specifically, it instructs the National Security Agency (NSA) to update the Commercial National Security Algorithm Suite (CNSA Suite) and to transition their systems to use compliant and quantum-resistant cryptography. 

For the last 6 years our world-renowned team of crypto scientists have been working on a unique, Goppa code-based cryptographic encryption that has obtained a patent, backed by industry leaders and emerged unscathed in two global hackathons (2019 and 2020 respectively). More importantly IronCAP™ is available today!  It operates on classical computers and is quantum-safe, protecting your data from cyberattacks coming from quantum computers as well as classical computers.

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you?

References:

Venture Beat

EETimes