Author: Johann Plüss

2025 Radar of Post Quantum Safety Solutions 

Quantum computing threatens today’s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three…

Post-quantum cryptography is here: what are the consequences and actions for large organisations? 

This summer's post-quantum news: what you need to know  This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process…

Back to top