Quantum computing presents a unique challenge for modern computing, as it has the potential to completely break the cryptographic algorithms that are currently used to secure data. New algorithms have been designed to be resistant to attacks from quantum computers, but it is becoming increasingly clear that the next generation of cybersecurity will require more than just incremental change to stop attacks.
NIST Announces First Four Quantum-resistant Cryptographic Algorithms
The National Institute of Standards and Technology (NIST) issued a call to find the quantum resistant algorithm to challenge the capabilities of quantum computers. They recently announced the selection of the first four quantum-resistant cryptographic algorithms from a pool of over 60 submissions. These algorithms are designed to protect data from quantum computers, which can leverage processing power to break traditional encryption methods. Unfortunately, the most recent efforts were easily broken on a PC.
As quantum computing technologies continue to develop, the desire for quantum-resistant algorithms increases. The underlying premise is that algorithms are essential for protecting data from quantum computers. Instead of passively accepting this flawed thinking, QWERX is challenging the premise that stronger algorithms are the future of cybersecurity. We believe the solution lies in a new and innovative technical approach, and we're building the applications to back it up.
QWERX has developed an authentication method built on post-quantum cryptography, eliminating algorithms completely.
QWERX assumes that any encryption scheme that relies upon an underlying mathematical algorithm can be broken mathematically. Therefore, we have developed and patented a method for machine authentication using secure symmetric-key cryptography that eliminates algorithms. Instead, we adapt nonlinear information from the very rich source provided by nature. That information can come from a variety of places. It can come from naturally chaotic systems such as turbulence, or from quantum behavior, such as the randomness of radioactive decay. With no algorithm to break, quantum computing becomes much less of a threat to the security of protected data and communication. What about a brute force attack using a quantum computer to try and guess the key at a high speed? QWERX's ephemeral key infrastructure continuously generates new keys faster than the time it would take even a quantum computer to guess it. QWERX defeats the threat of data breach via quantum computing not by creating stronger algorithms, but by eliminating algorithms altogether.