Post-quantum cryptography includes those asymmetric cryptographic methods that cannot be broken by a quantum computer. Almost all asymmetric methods currently used in practice – especially RSA and Diffie-Hellman – do not belong to post-quantum cryptography, as they are quite vulnerable to a quantum computer. In contrast, lattice methods and hash-based methods, among others, are considered quantum-safe. The transition to post-quantum cryptography, which should take place before quantum computers are ready for practical use, is an important task for the coming years.
- cryptovision employee Klaus Schmeh gives lecture at TeleTrusT Signaturtag
- Atos completes the acquisition of German cryptography specialist cryptovision and strengthens its cybersecurity product line
- GreenShield e-mail security software convinces BWI for the German Armed Forces
- cryptovision product GreenShield included in NATO catalog
- 223 billion euros in damage caused by cyberattacks on German companies