Category Archives: IronCAP

The #Tourbillon Central Bank Digital Currency #CBDC Project

#Tourbillon, a new project to improve cyber resiliency, scalability, & privacy as a prototype CBDC.

The project has been launched by BIS Innovation Hub’s Swiss Centre and the goal is for the prototype to be finished by mid-2023, and BIS states results will be relevant to both wholesale and retail CBDC.

“To achieve cyber resiliency the project will be experimenting with #quantum-resistant #cryptography. For scalability the project will use an architecture compatible with distributed ledger technology, although not based on it. By making each transaction separate, the system resources scale linearly. The project seeks to verify the linear scalability of the design with realistic parameters.” FinExtra News reported.

Tourbillon aims to create privacy by providing it for the payment sender but not for the recipient. Regulatory and compliance checks will continue to apply.

Central bank digital currency (CBDC) is money that a central bank, like the Bank of England, can produce. It’s called digital (or electronic) because it isn’t physical money like notes and coins. It is in the form of an amount on a computer or similar device. A CBDC is different from cryptocurrency (also known as cryptoassets). Cryptocurrencies are NOT issued by a central bank. A CBDC is simply digital fiat, whereas cryptocurrencies are digital assets on a decentralised network.

Many countries are developing CBDCs, and some have even implemented them!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

How can #IronCAP help #business prepare for #quantumcomputing?

In the age of so-called smart technology, there’s one major threat we all face – and you may not even know about it yet.

Quantum computing threatens to undermine much of the security of the digital world that we have come to rely on, and if you haven’t already started planning ahead, your business will be at risk in the very near future. Fortunately, there’s still time—if you act now, you can ensure your business will be protected from quantum computing’s devastating effects by learning how to implement IronCAP Toolkits into your technology.

Today, quantum computing is still in its nascent stages, but experts predict it will take off within the next ten years. Quantum computers could be used to crack encryption codes that we use today to protect our data, including sensitive medical records, banking information and personal communications. However, with proper preparation and implementation, you can make sure your business is not left behind in this changing landscape of cyber-security threats. Read on to learn about how IronCAP’s advanced cybersecurity tools can help you prepare your business for the challenges of quantum computing and the future of online security.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why is #IronCAP the preferred #postquantum #cybersecurity solution?

Unlike regular computers, quantum computers work so quickly that they can crack security measures in seconds – something that conventional computers can take years to do.

Quantum computers exploit the quantum effects to perform memory and processing tasks using qubits, or quantum bits. Because of this, both memory and processing are performed in parallel rather than the traditional serial method. It’s faster than regular computers and may be used to create powerful security technologies.

Quantum computers build upon the principals of quantum mechanics to give us an entirely new way of computing. They operate by taking advantage of quantum mechanics to perform computations, which means they can function on a scale far beyond classical computers. This gives them immense power and speed, which has led many physicists to predict that they will one day replace our current computing methods.

IronCAP X is a post-quantum cybersecurity solution that thwarts cyber attacks from both the classical world of computers today and quantum computers in the future. It is easy to use, with an interface that integrates with everyday email clients. Protecting data has never been more important. The world’s cybercriminals are becoming increasingly sophisticated, using new technologies to breach networks. IronCAP X is designed to protect businesses and individuals against sophisticated cyber hacking by hackers, rogue states or tyrants.

  1. IronCAP provides security against cyber attacks from both the classical world of computers and quantum computers.
  2. IronCAP is easy to use, with an interface that integrates with everyday email clients.
  3. IronCAP has a patent-protected cryptography system

IronCAP X provides easy-to-use, post-quantum cryptography for remote access and VPN applications. Post-quantum cryptography protects against both classical and quantum computers.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#CyberAttacks Have No Boundaries

There are cyberattacks on corporations and government bodies daily. We have all heard of the famous Twitter hack where a number of high-profile politicians and tech leader accounts were hacked to scam people into transferring their cryptocurrency. Blockchain and cryptocurrency are not immune to hacking. A family of malware, KryptoCibule, has been stealing cryptocurrency from users since as far back as December 2018, as per security firm ESET.

Quantum computing is now accelerating rapidly into commercial applications and that unfortunately will also include quantum hacking. The good news is that IronCAP has already successfully built a quantum-safe encryption that protects you from pre-quantum and post-quantum threats.

Clearly, cryptography is the key and quantum-safe encryption is the bulletproof vest for your data. Your traditional computers are not quantum-safe and cannot withstand the power of quantum hacking.  BUT IronCAP’s patent-protected cryptographic technology can make you quantum-safe.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Disruptive #Cyberattacks could easily cripple a nation

Energy supplies and critical infrastructure is not immune from attack!

On May 7th, 2021, Colonial Pipeline, the largest American oil pipeline system that carries 2.5 million barrels of fuel a day delivering 45% of what is consumed on the East Coast of the United States, was shut down by a ransomware attack.

The only surprise – is that anyone is surprised! First the SolarWinds and now this blatantly demonstrates the weak cybersecurity of critical national infrastructure. One thing is certain that we need a more advanced approach towards cybersecurity.

Ever since the Colonial Pipeline ransomware attack has become public knowledge, there has been panic fuel buying in the East Coast of the United States.  Fuel prices have creeped up across the country, and 17 US States and Washington DC have declared states of emergency. CTV news quoted U.S. President, Joe Biden, “We need to invest to safeguard our critical infrastructure.” And Energy Secretary, Jennifer Granholm, said the attack “tells you how utterly vulnerable we are” to cyberattacks on the U.S. infrastructure.

Cyber threats are real and can turn catastrophic with the arrival of quantum computing.  We can prevent these crippling cyberattacks by updating our approach to cybersecurity – becoming quantum-safe.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#QuantumComputers are here and available for anybody to use

Could Quantum Hacks be the “Cyber Pearl Harbor”?

It’s a known fact that quantum computers are here and readily available for anybody to use. You read that right! They’ve arrived – the world’s first portable #quantum computers from #SpinQ. They’re not cheap, find out more at: http://spinquanta.com

Back in 2019, IBM had already unveiled their first commercial quantum computer.  In the same year, Google claimed quantum supremacy, and even Amazon offered their quantum computers for the public to use via their cloud service BRAKET.  In the summer of 2020, Honeywell announced that their quantum computers were superior to IBM’s and Google’s.  They also claimed they would increase their quantum volume 10X each year.  In December 2020, China’s University of Science and Technology announced their version of quantum computers claiming a million times faster than IBM’s and Google’s.  It’s evident that the global quantum computing race has begun some time ago already.

All of the above is just information available to the open world.  We have no idea what the closed world (i.e. national level) entails. Every day we hear news on cyberattacks at companies or government agencies that seemed unreachable before.  A quantum hack could have very well arrived quietly.  What do you think about the SolarWinds hack? The ransomware attack on the US JBS meat processing company and the Colonial Pipeline? The list goes on. Still got doubts? Here are what industry experts said at our latest quantum-safe readiness webinar.

Florin A. F., Director of CGI Innovation Center Montreal said, “…We think quantum computing is in the future and is a future risk. The reality is that every and each document that is stored today somewhere on a system for a financial institution is actually a potential document that is under attack…”

Asif Qayyum, Managing Director, Digital Security Risk & Controls at PwC Canada said, “…However one thing is for sure that everyone is realizing that the Q-day might have already occurred …..and because a breach that could have happened or a database which is encrypted but lying somewhere there, as soon as that readiness or availability of technology comes into the hand of these adversarial players that is going to explode multi-fold…”

These are just a little excerpt from the valuable insight these leaders provided at the webinar. You can watch the complete webinar here: https://www.youtube.com/watch?v=uy0el3lCosU

It’s believed that quantum hacking is approaching fast. This will render all the current encryptions vulnerable and hence make internet data, banking transactions, emails and etc. defenseless. We CANNOT emphasize enough on the urgency to upgrade the entire digital world to become quantum-safe.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

ISACA Now – The #QuantumComputing Threat: Risks and Responses

The Quantum Computing Threat: Risks and Responses

Editor’s note: The ISACA China Hong Kong Chapter hosted a recent webinar on the topic “Quantum Threat: Risks and Response.” The event, moderated by Michael Yung, strategic advisor, Google Cloud, featured panelists Andrew Cheung, president/CEO, 01 Communique Laboratory Inc., Samuel Sinn, partner, digital transformation advisory services, PwC China and Hong Kong, William Gee, advisor, innovation and digitalisation, PwC China and Hong Kong, and Welland Chu, alliance director, Thales. The webinar included more than 130 online and onsite participants from a variety of backgrounds, including government officials, regulators, large corporates, and more. Below is a summary of the insights shared from the panel:

Michael: Quantum computing promises to change the world through many groundbreaking applications. At the same time when the world is already grappling with cybersecurity issues daily, such as data breaches, ransomware and more, will the arrival of quantum computers make matters worse?

With the focus on the quantum threat, our expert panel will share with us their views as well as how we shall respond to this threat. We will discuss the following topics:

  • What is quantum computing?
  • Implications to today’s cybersecurity practices and why these matter?
  • Who is most at risk and how can we implement Post-Quantum Cryptography (PQC) in the real world?
  • What can corporate leaders do today to mitigate the risks and what solutions are available now?

What is quantum computing?

Samuel: Classical computers are fundamentally based on the on/off states of switches called bits, while quantum computing is based on the nature of quantum entanglement and superposition. In simple terms, quantum computers allow on/off at the same time so that it is behaving like having millions of classical computers working in parallel to collectively solve the same problem.

Alongside any huge breakthrough in technology brings new risk: Quantum computing, with its unique powers, will render today’s encryption technologies obsolete. Since these encryption technologies formed the security bedrock of all digital activities today, our day-to-day functions such as financial transactions, money transfers, data protection, etc., would be impacted.

There is no 100 percent secure encryption in the world; we consider an encryption algorithm “safe” if the time required to break it is longer than the average lifespan of a human. With quantum computing, many of the encryption algorithms we rely on today would become unsafe overnight.

Andrew: Today’s encryption is based on prime number factorization, which is easy one way but extremely difficult in reverse.  It just takes milliseconds to multiply two very large 250-digit prime numbers to give a very large semi-prime number, but it will take over 150 years to do the reverse to brute force all the combinations. In the last 40-plus years, the strategy to keep ahead of advances in computation power is simply to extend the key size. The emergence of quantum computing made this approach ineffective: regardless of the key size, quantum computers can reduce the time to crack certain encryption algorithms from hundreds of years to merely seconds.

Implications and why we should care now

Welland: In 2019 Google reported that its 53-qubit Sycamore processor had completed in 3.3 minutes a task that would have taken a traditional supercomputer at least 2.5 days. In 2021, IBM announced Eagle, a 127 qubits processor, and that by 2023 a quantum processor with >1,000 qubits would be available. Major technology providers like Microsoft and Amazon have also started to offer quantum computers and simulators on their cloud services platforms. The global enterprise quantum computing market is estimated to grow at a CAGR >33%, reflecting the resources that are being directed into this field.

William: The race to “quantum supremacy” will significantly compress the development timeframe of quantum computers, and the availability of quantum computing capability in the cloud will not only further advance developments but also mean that bad actors could also easily access this technology. While there is still debate over when “Q-Day” will arrive, this is becoming less relevant when increasingly hackers adopt a “grab and wait” strategy by simply stealing the data first and decrypting once they can get hold of the cracking tools.

Who is most at risk and how we should implement PQC?

William: Asymmetric cryptographic systems are most at risk, implying that today’s public key infrastructure that form the basis of almost all of our security infrastructure would be compromised. That being said, the level of risk may be different depending on the data to be protected – for instance, a life insurance policy that will be valid for many years to come; a smart city that is built for our next generation. Similarly, the financial system, both centralized and decentralized, may have different vulnerabilities. For this reason, post-quantum security should be addressed as part of an organization’s overall cybersecurity strategy. It is of such importance that both the C-suite and the board should pay attention.

While blockchain-based infrastructures are still considered safe, being largely hash-based, transactions are digitally signed using traditional encryption technologies such as elliptic curve and therefore could be quantum-vulnerable at the end points. Blockchain with quantum-safe features will no doubt gain more traction as NFTs, metaverse and crypto-assets continue to mature.

Finally, the unique features of quantum computers is such that one would not use these for tasks such as word processing, thus implying that classical computers and quantum computers will likely co-exist for some time, making it even more important for everyone to address this quantum threat.

Welland: Companies and experts in the cybersecurity space have joined forces to combat this imminent threat. One aspect to note is the time needed to standardize cryptography in a global context: many of our audience may still remember the duration and effort taken to migrate 3DES to AES two decades ago!

It may be decades before the community replaces most of the vulnerable public-key systems currently in use today with new post-quantum cryptography. In the cybersecurity world, we should establish a robust set of preventive controls from enhancing awareness to taking a range of precautionary, detective and corrective measures so as to minimize the impact of the quantum threat.

What can be done today and what solutions are available?
Andrew: Many international organizations such as The National Institute of Standards and Technology (NIST); European Telecommunication Standards Institute (ETSI); PQCrypto; SAFEcrypto; and CREST Crypto-Math have been taking actions to find and recommend the next generation of cryptographic systems that are safe against quantum computers.

NIST started in 2016 with five categories of technology and a total of 82 candidates. Earlier in July, NIST announced the first four candidate algorithms that have been selected for standardization and four additional algorithms will continue into the next round. The final announcement of NIST PQC standard will likely to be in 2024.

It is important to note that the single most important factor on the robustness of an encryption method is how long it has been time-tested without a cracking theory because all encryption algorithms are safe until such a cracking theory is discovered.

Given the pace of technological advancement, going forward, “crypto-agility” – the ability of an organization to change cryptographic algorithms quickly to adapt to evolving security landscape – will be critical. A handful of forward-thinking companies have been taking meaningful actions by creating the API and solutions based on the remaining candidates of NIST.  This means, on day 0 when NIST announces the final recommendations, there will be a solution that companies can use the next day, rather than having to wait another few years for the tools to be developed.

Final thoughts

Andrew: There are quantum-resistant solutions available today that comply with industry standards such as PKCS#11, OpenSSL, but are not yet openly endorsed. This is still way better than standing naked in front of the quantum threat.

Samuel: Business leaders should address the quantum threat at the earliest opportunity. Rapid transition to new information security technologies are unrealistic as much of our infrastructure and network systems today are interconnected, often on a global level. Responding to the quantum threat will require significant infrastructural, cultural and procedural change, as well as funding on a scale that has not seen since the Y2K threat.

Welland: Stay agile and be flexible. Ensuring adequate protection for the future while complying with today’s standard is crucial for any business to keep up with compliance and regulatory requirements. There is a need to deploy applications and network equipment that are able to accommodate both pre-quantum and post-quantum cryptography at the same time, with the ability to switch swiftly to a different algorithm as the need arises.

William: Know your data and information assets that you need to protect, and take a risk-based approach to achieve a balance between cost and security. Plan ahead while remaining flexible as preparations need to be highly responsive and dynamic given the pace of technological advancement.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#BNBChain Halted After Suspected $536M Hack

A wallet worth over $536 million started acting erratically, prompting the #BNBChain to halt completely!

BNB Chain has been halted after a large BNB holder started displaying erratic on-chain behaviour, suggesting a hack. The erratic nature of the wallet’s on-chain activity suggests it may have been compromised. Stablecoin issuer #Tether has also already stepped in to blacklist the address, preventing it from sending USDT to new wallets.

While the hackers were able to get away with roughly $100 million, the potential amount could have been as much as $570 million.

Patrick Hillmann, chief communications officer at crypto exchange Binance, commented that BNB validators noticed some strange activity taking place on BSC Token Hub, one of the platform’s bridges ,and came to the conclusion the bridge was being utilized to mint additional BNB tokens. He compared the exploit to a group of thieves breaking into the U.S. Federal Reserve, printing their own money and then walking away with it. “What we’re seeing here is that as we see more of these attacks on bridges, the communities that rally around these blockchains are getting much better at shutting them down quickly, updating their systems and being able to prevent a worst case scenario from happening,” Hillmann said.

This hack has a strong smell of a quantum hack although no one can say for sure. This is because the cause of the hack was most likely that the private key of a huge account was compromised. This is exactly the weakest link of crypto facing quantum.

“While it is unknown about what exactly is the cause, this must be some how related to the private key being compromised whether it is bug in the wallet or a reverse engineering of the public key via quantum computer. It is now crystal clear what would happen when a private key is compromised by a quantum hack” said Andrew Cheung, President, 01 Communique.

Quantum-resistant encryption research is a hot topic because it is felt that quantum computers are almost certain to become prevalent and sufficiently powerful to crack existing encryption algorithms. It is therefore prudent to prepare crypto that can survive future attacks, so that data encrypted today remains safe tomorrow, and digital communications can remain secure.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

You Can Stop #Ransomware Attacks Today. So Why Wait?

Disruptive ransomware attacks are on the rise.

Just in the last few years, we witnessed the LinkedIn data breach, the JBS attack, the SolarWinds hack, the Kaseya ransomware attack and many more. It is evident that making cybersecurity front and center is critical. Industry experts are expecting the global cybersecurity market to surpass USD $400 billion in 2028. All these signal that not only business leaders but ordinary people using the internet should not wait for a bad incident to occur before making a move.

In June 2021, LinkedIn data was compromised. The records of 700 million clients are now for sale on the dark web. This happened in the blink of an eye but what is worse is the ripple effect for users that used important passwords for LinkedIn. Even if their passwords were not breached, there is still valuable data that can be used for identity theft and phishing attempts. Hackers are constantly phishing for data, sending out millions of fake security alerts and bank alerts email everyday. If they can provide some “legitimate” information (from the breached data) on their phishing email, they will look more convincing and recipients are more prompted to click on the malicious links.

Think about this – LinkedIn, JBS, Colonial Pipeline and all other multi-billion-dollar corporations have unlimited resources to safeguard their data but still got hacked, what are the chances that smaller companies can secure their data? The answer is, you have good chances if you secure you email communications.

Most ransomware attacks come from phishing emails. You click on just one malicious link and you risk having your private information breached, email message content and attachment being intercepted and altered, and suffering financial and creditability damages. Therefore, you should secure your emails today. IronCAP X™ is THE SOLUTION TO STOP PHISHING!

IronCAP X™ is easy to install, a is user-friendly and a cost-effective solution. Its quantum safe, end-to-end email encryption eliminates the intermediary server, and its digital signature feature authenticates a legitimate sender from a malicious one. IronCAP X™ will be your armor to eliminate ransomware attacks. An ounce of prevention (IronCAP X™) is worth a pound of cure (data loss). The choice is yours!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

All Data Today is #Quantum Vulnerable, act now!

Quantum threats are very real and we must become quantum-safe now in order to beat Q-day.

In the last few years we have seen a continuous upward trend in the number of cybersecurity breaches, with the record high being broken month-over-month. It is about time companies need to improve their cybersecurity defenses. The number one thing they need to be aware of is that the current encryption that protects their data is NOT GOOD ENOUGH.

In 2021, approximately 281.5 million people have been affected by a data breach.  More than 60% of the U.S. information security professionals said ransomware is as serious as terrorism. According to IBM, the average cost of a data breach is over $4 million and Mimecast estimates the average ransomware demand against US companies is over $6 million.  Even more alarming, Cybersecurity Ventures expects global cybercrime cost to reach $10.5 trillion USD annually by 2025.

It has been proven in the last two years that it’s a child’s play to phish individual’s private data; and no magic to breach the cybersecurity defenses of a multimillion-dollar company. This will get even more disastrous with quantum advancements headed our way.  Nation states and tech giants are already spending millions on quantum advancements. For example, on August 26th 2020, the U.S. Department of Energy (DOE) budgeted $625 million for quantum advancements. In 2021, Honeywell Quantum Solutions and Cambridge Quantum achieved a quantum volume of 1,024 and demonstrated real-time error correction that enables quantum machines to do more significant calculations with fewer qubits. And most recently in 2022, research led by the University of New South Wales, Sydney has proven that a near error-free quantum computing is possible, paving the way for large silicon-based quantum processors for real-world manufacturing and application.

Q-day, the day when quantum computers render all current encryption meaningless will soon be here, and may have even arrived already.

Government agencies across the globe are scrambling to find the best quantum-safe methodology. Among them the highly regarded NIST (National Institute of Standards and Technology) in the US is still two years away from announcing their “preferred method”.  It will be a big mistake to leave our data at risk of quantum threats now and wait for two more years.   Fortunately, a group of crypto-scientists have pioneered the development of IronCAP™ starting several years ago.  It’s a patent-protected quantum-safe encryption technology based on Goppa code-based system – 1 of the 5 favorable post-quantum cryptographic approaches recommended by NIST at this time.  IronCAPTM is readily available for people to deploy on their classical computers today. It can be integrated with all kinds of vertical solutions such as email/file encryption, remote access/VPN, cloud storage, 5G/IoT, blockchains, financial transactions, etc., and safeguard you from cyber threats today and in the soon to arrive quantum computing era.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.