PinnedPublished inIdentity Beyond BordersPost-Quantum Security Recommendations: A Technical GuideAs quantum computing advances, classical cryptographic systems face significant risks. Quantum algorithms like Shor’s and Grover’s can…Feb 25A response icon1Feb 25A response icon1
PinnedPublished inIdentity Beyond BordersCRYSTALS Kyber : The Key to Post-Quantum EncryptionIn the digital realm, quantum computing threatens traditional encryption. NIST’s Post-Quantum Cryptography Standardization initiative aims…Jan 5, 2024A response icon1Jan 5, 2024A response icon1
PinnedPublished inIdentity Beyond BordersQuantum Computing: The Demise of Traditional CryptographyIn today’s digital world, our secrets and data stay safe thanks to powerful codes that take supercomputers millions of years to crack. But…Nov 18, 2023Nov 18, 2023
Understanding Key Encapsulation Mechanisms (KEMs)Key Encapsulation Mechanisms (KEMs) represent a fundamental shift in how we think about key exchange, offering both quantum resistance and…Jun 24Jun 24
Quantum Key Distribution: Securing Data with the Laws of PhysicsHow the BB84 Protocol Leverages Quantum Mechanics to Make Eavesdropping ImpossibleMay 25May 25
Published inIdentity Beyond BordersPost-quantum communication with WSO2 Identity Server 7.0WSO2 Identity Server 7.0 secures HTTPS communication with post-quantum X25519Kyber768 key exchange, offering quantum-resistant protection…Jun 13, 2024Jun 13, 2024
Published inIdentity Beyond BordersX25519Kyber768 Post-Quantum Key Exchange for HTTPS CommunicationThe X25519Kyber768 algorithm combines the elliptic curve-based X25519 with the Kyber768 post-quantum key exchange scheme, offering a robust…Feb 2, 2024A response icon2Feb 2, 2024A response icon2
X25519Kyber768: Post-Quantum Hybrid Algorithm Supported by Google ChromeChrome now introduces the X25519Kyber768 algorithm for TLS symmetric secrets, beginning in Chrome 116 and accessible via a flag in Chrome…Feb 1, 2024Feb 1, 2024
CRYSTALS Kyber for Post-Quantum Hybrid Encryption with JavaKyber is a Post-Quantum Key-Encapsulation Mechanism (KEM) which can be used for share secrets between two parties. It is one of the…Dec 8, 2023A response icon1Dec 8, 2023A response icon1
reCAPTCHA: How it worksUnderstanding the inner workings of reCAPTCHA and its role in securing websitesMar 26, 2023A response icon1Mar 26, 2023A response icon1