“In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers …Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography.”
Is Your CSP Quantum-Ready Today? Not Likely.
We separate your data security from CSPs. With Cord3, you’ll be Quantum-Ready Today no matter which CSPs you use.
900 Morrison Drive Suite 202
+1 343 488 8720