Quantum Origin protects data and systems against evolving quantum attacks

 


Cambridge Quantum is introducing Quantum Origin – a commercially accessible cryptographic key generation platform based on verifiable quantum uncertainty. It is a commercial product made using a noisy, intermediate-scale quantum (NISQ) computer and has been assembled to secure the world’s data from both current and advancing threats to present encryption.

 

Quantum Origin

 

Uncertainty is threatening to securing existing security solutions as well as protecting systems from the upcoming threat of quantum attacks. These attacks will further decline deterministic techniques of random number generation, as well as means that are not verifiably random and from a quantum source.

 

Today’s systems are secured by encryption standards such as RSA and AES. Their resilience is based on the incapability to “break” a long string from a random number generator (RNG). Today’s RNGs, though, lack true, verifiable uncertainty; the numbers being produced aren’t as unpredictable as thought, such RNGs have been the point of disaster in a growing number of cyber-attacks. The possible threat of quantum attacks is now raising the stakes more, incentivizing criminals to steal encrypted data passing over the web, with a view to decrypting it later using quantum computers. Also known as “hack now, decrypt later” attacks.

 

 

“We have been working for a years now on a process to efficiently and effectively use the unique applications of quantum computers in order to offer our customers with a resistance against adversaries and criminals now and in the upcoming future once quantum computers are established,” said Ilyas Khan, CEO of Quantinuum and Founder of Cambridge Quantum. He further added “Quantum Origin provides us the ability to be safe from the most refined and dominant threats today as well as threats from quantum computers in the future.”

 

Duncan Jones, head of cybersecurity at Cambridge Quantum, told: “When we talk about securing systems using quantum-powered technologies, we’re not just speaking about securing them from future threats. From significant takedowns of organizations, to nation state hackers and the distressing potential of ‘hack now, decrypt later’ attacks, the dangers are very real today, and very much here to stay. Accountable enterprises need to install every defense possible to guarantee maximum protection at the encryption level today and tomorrow.”

 

Quantum-enhanced keys on demand

With Quantum Origin, when an organization needs quantum-enhanced keys to be created, it can now make a call via an API. Quantum Origin produces the keys before encrypting them with a transport key and securely transmitting them back to the organization. To offer organizations a high-level of assurance that their encryption keys are as volatile as possible, Quantum Origin checks the total output from the quantum computers, ensuring that each key is seeded from verifiable quantum uncertainty.

 

These keys are then simple and easy to incorporate within customers’ existing systems because they’re delivered in a format that can be consumed by customary cybersecurity systems and hardware. This end-to-end method ensures key generation is on-demand and is capable of scaling with use, all but remaining secure.

 

Quantum Origin in practice

Quantum Origin keys should be used in any situation where there is a necessity for strong cybersecurity. At launch, CQ will offer Quantum Origin to monetary services companies and vendors of cybersecurity products before escalating into other high priority sectors, such as telecommunications, energy, manufacturing, defense and government etc.

 

 


References


https://www.helpnetsecurity.com/2021/12/08/quantum-origin/

https://www.prnewswire.com/news-releases/cambridge-quantum-launches-quantum-origin--a-quantum-enhan301438568.htmlced-cryptographic-key-generation-platform-to-protect-data-from-advancing-threats-


Reactions

Post a Comment

0 Comments