Rather than using a password, users verify their identities with
public-key cryptography or biometric scan.
In stark contrast to current
public-key cryptography protocols for secure data transmission, which are rooted in mathematical algorithms and inherently breakable, Phio relies on the fundamental properties of quantum mechanics to physically transfer a shared secret between two entities.
Quantum-resistant
public-key cryptography is clearly vital then, in ensuring we're able to continue life as normal in the age of quantum computing, and to live and work as conveniently as we do now.
The topics include mathematical foundations for computer networks, an overview of cryptography, mathematical foundations for cryptography, modern symmetric ciphers,
public-key cryptography for data confidentiality, centralized authentication service, Pretty Good Privacy, Internet security services, system security, and the security of emerging technology.
Minebox IT Solutions GmbH builds data storage, archiving and backup solutions using NAS computers, blockchain technology, peer-to-peer networks,
public-key cryptography and open source, decentralised data storage systems.
With the threat of quantum computers being able to break currently used
public-key cryptography growing nearer and standards organizations, like the National Institute of Standards and Technology (NIST) and European Telecommunications Standards Institute (ETSI), working on creating new cryptographic standards, work on how these new schemes fit into existing protocols and systems needs to be done in parallel in order to ensure we are ready to mitigate the quantum threat in time,'' said Thorsten Groetker, Chief Technology Officer of Utimaco.
of Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of
Public-Key Cryptography, New York, NY, USA, pp.
Ibrahim Al-Freih, GM of internet services, Communications and Information Technology Commission, said: "The importance of the workshop stems from the pivotal role played by the DNSSEC based on the
public-key cryptography, in terms of enhancing security in the DNS and raising the level of verification of the source as well as the validity and reliability of information within the system, which contributes in the reduction of cyber-attacks, especially on authentication protocol data interception, also known by (man-in-the-middle)".
The company's enterprise grade software is based on
public-key cryptography and blockchain technology focusing on security and scalability.