Titelbild von Quantum Resistant Cryptography (QRC)Quantum Resistant Cryptography (QRC)
Quantum Resistant Cryptography (QRC)

Quantum Resistant Cryptography (QRC)

Computer- und Netzwerksicherheit

Lausanne, Switzerland 1.277 Follower:innen

Full range quantum-resistant protection, classical and post-quantum, from 2g to 6g

Info

Quantum Resistant Cryptography (QRC) offers a unique, efficient solution to keep digital communications safe now and in the future. Since our solutions are compatible with existing server infrastructure, they require no expensive new hardware to implement. QRC is the only quantum-safe solution in 5G systems that is recommended by the United Nations International Telecommunication Union. QRC provides the best symmetric and asymmetric quantum-resistant cryptography available, made to work coherently up to a 512-bit symmetric encryption level, which is double the current industry maximum provided by classical AES encryption. Even at 256-bit level, it is 9 orders of magnitude stronger than standard AES. QRC’s eAES® provides the missing link in the cybersecurity chain, plugging the AES security gap by: 1) replacing the differentially weak internal ‘key schedule’ with a cryptographically strong pseudo-random generator, and 2) increasing the number of transformation rounds to at least 2n, which is at least twice the best-known cryptanalytic attack against the AES ciphers that are currently used as a benchmark for NIST post quantum cryptography. QRC is not just for quantum. Because it was built to withstand quantum attacks, it is incredibly powerful against today’s classical attacks. ▪ QRC protects against side channel attacks, which is unique in the industry. ▪ QRC protects against ransomware: the data is already strongly encrypted, and the organization holds the key, no one else. ▪ QRC protects against “unknown unknowns” such as ever-evolving quantum machine learning-enabled attacks. ▪ QRC protects against data harvesters collecting data to be decrypted in the future. There is no better solution against today’s hackers, all while getting the best asymmetric and symmetric post-quantum cryptography for the threats on the horizon.

Website
https://qrcrypto.ch
Branche
Computer- und Netzwerksicherheit
Größe
11–50 Beschäftigte
Hauptsitz
Lausanne, Switzerland
Art
Privatunternehmen
Gegründet
2019
Spezialgebiete
cryptography, quantum resistant cryptography, encryption, cybersecurity, network security, critical infrastructure, defense, aerospace, fintech, crypto, finance, insurance, healthcare, privacy, data security, 5G, 6G, Li-Fi, quantum physics , mathematics, satellites, space, EPFL, Trust Valley, blockchain, Energy, Shipping und Optical Communications

Orte

  • Primär

    Trust Valley

    EPFL Innovation Park Building C

    Lausanne, Switzerland 1015 Lausanne, CH

    Wegbeschreibung
  • 100 Wall Street, 10th Floor

    New York, NY 10005, US

    Wegbeschreibung

Beschäftigte von Quantum Resistant Cryptography (QRC)

Updates

  • Hence, strongly encrypt your data with Quantum Resistant Cryptography (QRC), whose open source version is freely available on https://lnkd.in/dN3UDqfS, before putting it on *any* cloud!

  • Yes and we didn’t wait for you to implement it - all done on https://lnkd.in/dN3UDqfS, robust memory safe and open source - enjoy! (And justify to your investors Google & co how come with half a billion you absorbed from the market, you couldn’t be faster!)

    Unternehmensseite für SandboxAQ anzeigen

    34.004 Follower:innen

    The shift to post-quantum cryptography isn’t coming. It’s already here. How will organizations navigate the complexities of PQC migration? What challenges will emerge as new standards take hold? The Real World PQC Workshop, happening March 24-25, 2025, in Sofia, Bulgaria, is where the industry’s top experts tackle these questions head-on. This event brings together leaders from National Institute of Standards and Technology (NIST), Google, Amazon Web Services (AWS), Cloudflare, IBM, and more to share insights on deployment strategies, cryptographic agility, and the policies shaping the transition. Register by March 12 to be part of the conversation. https://bit.ly/4gWrpgQ Stephanie Reinhardt Bas Westerbaan Mike Ounsworth Matthew Campagna Sophie Schmieg Yarkin Doroz Michael Osborne Nari Lee Dustin Moody Christiane Peters Hubert Le Van Gong Ange Martinelli Felix Günther Dr. Stephan Ehlen Shay Gueron Johnathan Partouche Rafael Misoczki, PhD Ryan Hooper Jaime Gómez García

  • An interesting option for Switzerland too? StiftungsZentrum.ch

    Profil von Mark Cheng anzeigen

    National Security Strategist/Bridge Builder/China Veteran

    A US sovereign wealth fund was discussed during Trump I. Steve Bowsher and Sarah Sewall have the pros and pitfalls, particularly now, exactly right: "The right kind of American SWF could efficiently address this problem. It would identify the most important nascent technologies that struggle to attract capital, and back the best startups innovating in those industries. By signaling the national security importance of those technologies, an SWF would catalyze additional private investment toward areas of critical innovation and the supply chains that secure them. "But making an American SWF work would require care. Washington would have to insulate the fund’s managers from U.S. domestic politics, so that investment decisions are made without regard to who wins the White House or controls Congress. And although responsible stewardship of taxpayer funds would require managers to make sound financial decisions, investments must balance prospective returns with the clear strategic purpose of U.S. innovation leadership. This approach would make an American SWF unlike the investments controlled by Beijing, which has spent decades directing massive state and private resources to finance the Chinese Communist Party’s five-year development plans. Instead, Washington would use its SWF to identify priorities in commercial technology and nudge U.S. startups toward those goals—combining the interests of the nation with the dynamism and innovation of private investors."

  • Now, quantum safety became a basic necessity, beyond laws that already mandated it (and still do)! We deliver it, memory safe, available for download immediately on https://lnkd.in/dN3UDqfS, whilst others such as The Linux Foundation still ship software that isn’t production-ready, aside from serious governance issues and letting adversarial countries actively participate to it. Thank you Satya Nadella for steering Microsoft into becoming one of the most innovative big tech companies currently!

    Profil von Satya Nadella anzeigen
    Satya Nadella Satya Nadella ist Influencer:in

    Chairman and CEO at Microsoft

    A couple reflections on the quantum computing breakthrough we just announced... Most of us grew up learning there are three main types of matter that matter: solid, liquid, and gas. Today, that changed. After a nearly 20 year pursuit, we’ve created an entirely new state of matter, unlocked by a new class of materials, topoconductors, that enable a fundamental leap in computing. It powers Majorana 1, the first quantum processing unit built on a topological core. We believe this breakthrough will allow us to create a truly meaningful quantum computer not in decades, as some have predicted, but in years. The qubits created with topoconductors are faster, more reliable, and smaller. They are 1/100th of a millimeter, meaning we now have a clear path to a million-qubit processor. Imagine a chip that can fit in the palm of your hand yet is capable of solving problems that even all the computers on Earth today combined could not! Sometimes researchers have to work on things for decades to make progress possible. It takes patience and persistence to have big impact in the world. And I am glad we get the opportunity to do just that at Microsoft. This is our focus: When productivity rises, economies grow faster, benefiting every sector and every corner of the globe. It’s not about hyping tech; it’s about building technology that truly serves the world. Read more about our discovery, and why it matters, here: https://aka.ms/AAu76rr

    • Kein Alt-Text für dieses Bild vorhanden
  • We do take our moral obligations utmost seriously and hence, represent a valid alternative to conflicted, thin-spread giants that work hand in hand with US and generally speaking, democracies’ adversaries on a regular basis (see for instance the constituency of The Linux Foundation). Furthermore our solutions are memory safe and open source for an important part while production-ready, something none of our competitors can claim.

    Profil von Perry Boyle 🇺🇸🇺🇦 anzeigen

    Founder MITS Capital 🇺🇸🇺🇦🇺🇸🇺🇦 🇺🇸Board Director🔋 | UN SDG #1 🌍

    Matt Kaplan and Michael A. Brown of Shield Capital point out that civilian tech companies play a key role in war and ruminate on what the US should do. This article begs the question: "What are the national security duties of US corporations?" My observation: most act as if they have zero moral obligations. Ukraine is an example. Elon Musk enabled Ukraine to defend itself with STARLINK (although Russia uses it, too.). Microsoft and Amazon Web Services (AWS) helped Ukraine defend against Russian hackers. And they moved much faster than any government did--days versus weeks/months. Ukraine has honored them for this. But, they thought Ukraine would lose; their support was performative rather than a long-term commitment. Microsoft and Amazon still do business with Russia. Russians use Starlink to fight against Ukraine. Which side are the companies on? Both? "The U.S. government should manage public-private partnerships with active diplomacy, treating corporate entities and their leaders as it would allies. This means being prepared to hold technology companies accountable for actions that may undermine the national interest. But it also means including them in national security discussions, providing certain personnel with security clearances, and sharing information about threats that their technologies could be used to counter." The basis of this argument is wrong. Apple is not an ally or a democracy. US companies regularly act contrary to US national security interests. There are some constraints, like ITAR, but that is a constraint on innate corporate amorality. "Leaders in Washington must recognize that, although corporate interests and national interests will not always align, commercial capabilities may be essential to national security objectives. Because of this, the government must devise a framework that allows these interests to complement each other. The United States’ continued ability to defend its allies and partners may soon depend on how well it can harness U.S. tech companies’ growing power." On that last point, it's not soon--it's been true for a while, and we do a terrible job at it. The most popular operating system in China, Russia, and Iran is Microsoft Windows. Many laws exist to prevent corporations from acting against the national interest, but usually only in war. 1. Defense Production Act (DPA) of 1950 2. Trading with the Enemy Act (TWEA) of 1917 3. International Emergency Economic Powers Act (IEEPA) of 1977 4. War Powers Resolution of 1973 5. National Emergencies Act (NEA) of 1976 6. Alien Property Custodian (WWI & WWII Laws) If this article is any indication, companies and investors will be in for a shock once the US realizes that #WW3 is game on and brings those laws to bear.

  • Cybersecurity: such centralization of data without proper data protection is suicidal. Quantum Resistant Cryptography (QRC) would provide best data protection. Any organization serious about doing something like this without huge security risks that otherwise risk making the project a cause for total failure, should be talking to us.

    Profil von Catherine Granger anzeigen

    Founder & Investor at Trajan & Al Sakina 🇨🇭| International

    Can anyone tell me why this ask is so utterly controversial and been met with such outrage? What is so wrong with a cadence of accountability. This is President Trump's ask, reinforced by Elon Musk. I would love to ask the same of : The UK government 🇬🇧 The Scottish government 🏴󠁧󠁢󠁳󠁣󠁴󠁿 Glasgow City council🏴󠁧󠁢󠁳󠁣󠁴󠁿 Health ministers and all unionised organisations. 🇬🇧 The rest of us work ferociously, are held to account and deliver, what's the issue? #trump #USA #elonmusk #NHS #Scotland #Scottish #uae #Scottishgovernment #glasgowcitycouncil #keirstarmer #johnswinney #snp #UK #Scotland #federalgovernment #presidenttrump #tesla #starlink #america

    • Kein Alt-Text für dieses Bild vorhanden
  • Update: since a little less than a month, QRCrypto.ch provides its baseline pqc library free and open source, in memory-safe Rust, delivering what the Linux foundation promised about a year ago and has yet to deliver: robust pqc software. Deploy it and become quantum safe now. Talk to us for beyond type 1 security levels, which we sell at an extremely competitive price. SandboxAQ MITRE The Linux Foundation step up, or give up ;-). No, quantum market disruptor NVIDIA‘s acceleration won’t save you (and neither will their cheap CN clones chips for that matter)! :p P.s.: Renee Wynn no offense but you bet on the wrong horse (never too late to change though)!!!

    Profil von Anna Ribeiro anzeigen

    News Editor at Industrial Cyber

    Chinese government-sponsored hackers have allegedly breached the U.S. Navy infrastructure, the Secretary of the Navy confirmed Thursday. Speaking with CNBC’s Morgan Brennan, U.S. Navy Secretary Carlos Del Toro said that the hack by the Chinese government that Microsoft revealed on Wednesday has affected the Navy. Del Toro said the U.S. Navy ‘has been impacted’ by the cyberattacks, adding that it was ‘no surprise that #China has been behaving in this manner, not just for the last couple years, but for decades.’ He declined to provide further detail on the incursion but suggested that the Navy had been contending with #cyberattacks like this for years. The reveal comes as industry giant Microsoft revealed that the China-backed #VoltTyphoon group has since mid-2021 targeted U.S. #critica infrastructure, including the #manufacturing, #transportation, and #maritime sectors. The group has been identified as using ‘living-off-the-land’ techniques, while also focusing on post-compromise credential access and #network system discovery. The Chinese Foreign Ministry and state-controlled press dismissed the findings from Microsoft and the intelligence community as ‘disinformation.’ Addressing the level of concern the U.S. is about the Chinese state-sponsored hacking group Volt Typhoon’s recent cyber-attack targeting U.S. infrastructure and whether the U.S. believes that despite going after communication systems in Guam that Taiwan is the real target, U.S. Department of State spokesperson Matthew Miller said in his Thursday address that he is not going to speak to the last part. “What I will say is that we are aware of recent activity by a People’s Republic of China-sponsored cyber actor to develop a presence in digital networks across the U.S. critical infrastructure sector.” “The U.S. Government and close allies have released a joint cyber security advisory to help defenders identify and mitigate any such activity on their networks,” Miller said. “And the U.S. Intelligence Community assesses that China almost certainly is capable of launching cyber-attacks that could disrupt critical infrastructure services within the United States, including against oil and gas pipelines and rail systems.” Miller added that it is vital for government network defenders and the public to stay vigilant. “It’s why the U.S. Government, in a whole-of-government action, has worked with the private sector to prepare for defenses, and we – prepare private sector defenses. And we will continue to work with our allies and partners to address this critical issue.” #cyber #hacking #cybersecurity #infrastructure #digital #communication https://lnkd.in/gUwXha2A

  • Our software implementations do not exhibit the same typical vulnerabilities of cold crypto wallets, aside from being memory safe on top of that. For any serious blockchain project, one ought to use the best tools. We provide them, a great deal of which, open source* : https://lnkd.in/dN3UDqfS *under AGPLv3 license

    Profil von Andy Jenkinson anzeigen

    CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. NAMED AN EXPERT IN INTERNET ASSET & DNS VULNERABILITIES AND THREAT INTELLIGENCE

    In a staggering blow to the cryptocurrency industry, Bybit has fallen victim to a $1.5 billion heist, marking the largest theft in digital asset history. The breach targeted Bybit's Ethereum cold wallet, traditionally considered a fortress against online threats. However, clearly unlawful access was achieved. Within minutes of scrutinizing Bybit's cybersecurity infrastructure, we discovered a multitude of exposed domains, misconfigurations, and unsecured servers. This glaring negligence underscores a pervasive issue: the race for rapid growth in the crypto sector often sidelines essential security measures. Investors, enticed by potential gains, must now confront a harsh reality—without fundamental security protocols, their assets remain perilously vulnerable. This incident serves as a stark reminder that in the volatile world of digital currencies, robust security isn't a luxury; it's a necessity. Cybersec Innovation Partners

    • Kein Alt-Text für dieses Bild vorhanden
    • Kein Alt-Text für dieses Bild vorhanden
    • Kein Alt-Text für dieses Bild vorhanden
    • Kein Alt-Text für dieses Bild vorhanden
  • We are also witnessing lawfare from “panda lovers” yet the free world will win, and we will make it quantum safe; mark our words. And use our open source, quantum- and memory-safe encryption, a grain in the crankshaft of CCP-led global espionage and sabotage, available immediately. Download it now for free from https://lnkd.in/eGpFnUen (under AGPLv3 license, meaning you can use and share further so long you keep on sharing the source code). The antidote to deepseek and other annoyances detecting “bothering” content to the CCP, for all data of relevance. Note, for the sake of completeness: We also provide yet stronger, beyond type 1 encryption for a fee, for all highly critical use cases.

    Profil von Shannon Brandao anzeigen

    China Boss news on Substack 🇨🇳🗞🔥 shannonbrandao.substack.com

    🤔 #China and the #Munich Security Conference: The week in review 🇺🇲🇪🇺🇨🇳 👉At the Munich Security Conference, US Vice President JD Vance delivered a speech that strained transatlantic ties, blaming European governance instead of addressing threats from #Russia and China. His remarks, seen as aligning with #Europe's far right, sparked backlash from European leaders and deepened US-#EU divisions. Capitalizing on the discord, China's Foreign Minister Wang Yi positioned Beijing as a reliable partner, emphasizing economic cooperation and proposing China as a mediator in the Russia-Ukraine war. European leaders are now increasingly worried about a new "Yalta 2.0" scenario in which Washington, Moscow, and Beijing decide #Ukraine's fate without their involvement. 🇨🇳💼 In China #business, Jack Ma reemerged at a state-led meeting with President #XiJinping that was supposed to signal Beijing's renewed emphasis on private-sector-driven innovation. Yet, Ma's public return for a state propaganda party seemed to underscore the opposite, which is the persistence of state dominance. 🥊⚖️ China's #lawfare also escalated in extraordinary ways. Foreign #lawyers defending jailed #HongKong activist #JimmyLai faced threats, leading to concerns about Beijing's escalating transnational intimidation tactics. Lead lawyer Caoilfhionn Gallagher told The Guardian that "she had received threats via email and social media of dismemberment, rape, and death, which have extended to her #family in recent months." "I had a threat to rape one of my #children because of my work," she said. Meanwhile, #international #law firms fled China due to legal risks; Chinese companies are weaponizing lawsuits against #researchers exposing inhumane and fraudulent business practices, using legal intimidation to silence critics. 📍🗺 On the geopolitical front, the US quietly removed a key policy statement reaffirming its opposition to #Taiwan's independence, angering Beijing. US Admiral Samuel Paparo warned that China's #military exercises might be rehearsals for an actual attack as China flexed its naval power near #Australia, "sail[ing] within 150 nautical miles of #Sydney." **** 👓 There's more to tell you about China at Munich. Read my top story which is free and linked in the comments below. 👇 👉 Never miss a weekly update. Subscribe to the China Boss newsletter. Free and paid subscriptions are available here: https://lnkd.in/epPpY4f 🙏 😉 Have a great weekend. 🥞 #news #business #geopolitics

    • Kein Alt-Text für dieses Bild vorhanden
  • Hence, strongly encrypt your data before putting it on any cloud. We enable it for free with our open source pqc library* and for a fee, with our 512-bit eAES® encryption, available through the shop we set up for our distributor OSINTelligent®: QRCrypto.io *https://lnkd.in/dN3UDqfS

    Profil von Prof Bill Buchanan OBE FRSE anzeigen

    Old World Breaker, New World Creator

    Apple pull down a bit of their castle, rather than giving up their front-door key - but only in the UK. Overall, Apple had the choice of putting a back door in their data storage or pulling their end-to-end encryption server, and they decided to do the latter. I trust Apple and believe they have some of the best security around. When was the last time you heard of someone getting some malware on an Apple system? They support a proper secure enclave and are advancing a privacy-aware cloud infrastructure for machine learning. They have also brought forward homomorphic encryption applications. For all the big tech companies, I believe Apple leads the way in terms of supporting the privacy of the user. But, today, I'm disappointed that they are stepping back on the Advanced Data Protection tool because the UK Government put pressure on them to allow law enforcement agencies to peek into the iCloud. Like it or not, there is no magic wand that stops a bad actor from using something that a good actor has access to. Basically, if you leave your front door key under the mat, you have no guarantee that someone else will find the key and use it. Basically, we have advanced cybersecurity for the past few decades and now use end-to-end encryption in a way we should have done from the start of the Internet. Of course, there are no winners in this, and society must find ways to protect itself from bad people, but opening up the whole of iCloud seems like a disaster waiting to happen. The door is open for other more agile companies to support enhanced security and privacy, as the large tech companies seem to be applying the brake on some of their security advancements. Read more: https://lnkd.in/eFkY-VWM

    • Kein Alt-Text für dieses Bild vorhanden

Ähnliche Seiten

Finanzierung