“In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers …Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography.”
Is Your CSP Quantum-Ready Today? Not Likely.
We separate your data security from CSPs. With Cord3, you’ll be Quantum-Ready Today no matter which CSPs you use.
- Ottawa cybersecurity firm Cord3 lands $2M financing from BDC CapitalOctober 29, 2019 - 4:00 pm
- Cord3 Innovation Announces Financing from BDC Capital to Support GrowthOctober 3, 2019 - 2:32 pm
- Cord3 Named 2020 TAG Cyber Distinguished VendorSeptember 24, 2019 - 2:05 pm
- Protect Your Data from Privileged Credential Attacks – Detecting Attacks is Too Late!July 5, 2019 - 11:05 am
900 Morrison Drive Suite 206
+1 343 488 8720