Quantum computing is gaining more and more space not only in the media, but also in the research and development budgets of large companies and governments.
No wonder: quantum information theory makes it possible to quickly and accurately solve old and difficult problems – such as the simulation of drugs and the calculation of logistics networks – using new classes of algorithms. So, solving “exponentially” difficult problems, calculated by a quantum computer, passes into the field of solvable, i.e. polynomial complexity.
Follow us on Instagram, Telegram or Whatsapp and stay up to date with the latest news from our military and defense industry.
“However, it is precisely this paradigm shift that makes it possible to break the fundamental foundations of cryptography used today: with the work of quantum computers, the effort required to break algorithms such as RSA and elliptic curves leaves a world of exponential difficulty (“millions of years”) for earthly efforts,” he explains Dr. Roberto Gallo, CEO of KRYPTUS.
Although quantum computers are not for everyone – and cryptographic threats are still not practical – the fact is that people, companies and governments most of the time protect information for the future: the validity of a digitally signed contract must be guaranteed for years, a classified secret communication may have to be maintained for decades.
Furthermore, “many intelligence agencies are already collecting encrypted data to read when the quantum computer becomes a reality, in an attack known as a Store-Now-Decrypt-Later (SNDL) attack,” according to Dr. Waldyr Benits, head of cryptology at the company.
For this very reason, regulatory bodies around the world, especially the American NIST, are not only looking for standardization of algorithms resistant to quantum computers (called Post-Quantum algorithms), but also recommending that organizations already have a clear transition plan. of your current systems.
Aware of this movement, in line with its historical leadership in innovation, Kryptus has launched a new version of its KeyGuardian (KG) crypto notebook that is now fully quantum-resistant in both symmetric and asymmetric operations.
For symmetric operations, KG supports PQC either through single-string encryption (also called one-time pad – OTP) or by executing symmetric block algorithms with keys up to 512 bits. Regarding the asymmetric secrecy operation, KG has an algorithm selected in the 3rd round by NIST, in the PQC standardization process.
This makes KeyGuardian the first commercially available handheld device on the global market to offer comprehensive post-quantum protection (PQC) for data and communications privacy.
Used by users inside and outside of Brazil, KG can be used in multiple use cases, such as encrypting and signing documents, files and folders, establishing VPNs, storing files on a device in an encrypted volume, and second factor authentication. “With PQC, we see great potential for the expansion of solutions in the most diverse market segments,” concludes Gallo.
More about OTP encryption:
A one-time block, or OTP, is an encryption technique where each byte of plaintext data is combined with another byte of a truly random string (OTP key stream) to produce ciphertext. To decrypt the message, the other party must have an exact copy of the OTP block to reverse the process. As the name suggests, a disposable pad should only be used once and then destroyed. When properly applied, OTP encryption provides a truly impenetrable cipher supported by Information Theory. Therefore, its use is highly recommended for military, diplomatic and intelligence agency communications.
It was originally described in 1882 by the American banker Frank Miller, and was re-invented in 1917 by Gilbert Vernam and Joseph Mauborgne. Its name comes from the sheets of paper (blocks) on which the flow of the key was usually written. As the latest security technique, OTP encryption secures critical applications such as the so-called “Red Phone” that connects the White House to the Kremlin.