The quality of a cryptographic procedure depends on the effort a potential attacker would have to expend to “crack” a message without knowing the key. The effort consists of the required computing time (i.e., number of computing operations) and the required memory. Weak cryptographic methods can be cracked with relatively little effort (i.e., also relatively low costs).
- Newly published: Atos whitepaper on post-quantum cryptography
- Newly published: cryptovision special issue of “The Vault” magazine
- US standards body NIST announces four winners in post-quantum competition
- Mindshare 2022 video: Two great days in 70 seconds
- New GreenShield version receives BSI approval