50 Most Admired Companies to Watch 2023
Cio Bulletin
Quantum computing looms, and existing security solutions can’t guarantee your data remains yours. Qrypt was established to protect and defend our collective privacy from exploitation, regardless of where the threat originates. Founders, Kevin Chalker and Denis Mandich, hand-selected prodigious leaders from engineering, physics, and cryptography to create a new standard in security. Via strategic investments in cutting-edge quantum hardware companies and exclusive partnerships with premier global research institutes and U.S. national labs, Qrypt has built the only cryptographic solution capable of securing data indefinitely.
Qrypt’s quantum-secure encryption gives people the tools they need to immutably secure their data and their right to privacy. Through great partnerships and an unmatched team pedigree, Qrypt has built patented encryption methods and applications that allow everyone to reclaim their right to digital autonomy.
Qrypt Quantum Key Generation
Transmitting keys is a foundational risk to security, as they can be harvested and decrypted later. This is a step-by-step description of how Qrypt’s independent key generation technology provides long-lasting protection against data attacks. Transmitting keys is the risk. Cryptographically relevant quantum computers will break today’s RSA and ECC encryption. NIST PQC algorithms are new and have yet to show resilience over time. When keys are broken, everything an attacker intercepted and stored can be exposed. In the long term, today’s data is not secure. Qrypt Quantum Key Generation works by sharing a recipe to enable parties to each create the same key.
It starts with true quantum random numbers. Qrypt Quantum Entropy servers provide unique pools of random numbers that are the resource used to create keys. The Qrypt Quantum Security SDK accesses the servers and locally creates a symmetric encryption key or one-time pad. A recipe is then created that includes server and key generation parameters. This short-life recipe is then shared with recipients.
Short-term assumptions for long-term privacy
This recipe is sent over any channel that can maintain data security for at least an hour. RSA, ECC, and NIST PQC all meet this requirement. Why does this work? An attacker must intercept the recipe and decrypt it in under an hour. The attack fails if the recipe can’t be decrypted before random number pools are shredded.
Long-term privacy and security
Once you generate keys without transmission, you achieve long-term security. Even if a technique is invented to break encryption in less than an hour, previously transmitted data isn’t at risk as keys were not transmitted or harvested. You update future recipe transmissions to use new encryption sustaining your long-term security. With Qrypt, by assuming short-term security you get long-term privacy and security. Since encryption keys have never gone across the wire, your data is never at risk from a harvest and decrypt later attack.
Quantum Breakthrough
Some news in the world of quantum communication. A Chinese research team recently announced a significant milestone, achieving quantum key distribution (QKD) at a distance of 615 KM using an open configuration of twin-field QKD. While this achievement is a testament to the rapid advancements in quantum technology, it’s essential to recognize that QKD has limitations.
Qrypt has developed a groundbreaking alternative to QKD: Quantum Key Generation. Qrypt’s technology offers several key advantages, making it a more practical and robust solution for secure communication. Here are some of those advantages:
No distance limitations
Unlike QKD, which has strict limitations on distance and requires dedicated fiber runs, Qrypt’s Quantum Key Generation overcomes these constraints by enabling multiple parties to independently and securely generate identical symmetric keys and one-time pads at multiple endpoints.
No key transmission
Qrypt’s BLAST protocol eliminates the need for encryption key transmission, completely mitigating the risk of interception or man-in-the-middle attacks.
Cost-effective
Qrypt’s technology doesn’t require dedicated fiber, satellites, or other expensive infrastructure, making it a more affordable solution for quantum-secure communication.
High-speed and always-on
Qrypt’s Entropy technology leverages multiple high-rate quantum random number generator (QRNG) appliances in the cloud, providing true random numbers securely accessible from anywhere with an internet connection at speeds many orders of magnitude higher than QKD.
Broad device compatibility
QKD is inherently limited in its ability to connect to a wide range of client devices, such as cell phones, laptops, desktops, IoT devices, and vehicles. In contrast, Qrypt’s Quantum Key Generation is designed to be compatible with various devices and communication channels, making it a more versatile solution for securing our increasingly interconnected world.
In summary, while the recent twin-field QKD achievement is indeed impressive, it is essential to recognize the limitations of QKD as a technology. Qrypt’s Quantum Key Generation offers a more practical, secure, and scalable solution, bringing us closer to realizing a quantum-secure future.
Meet the leader behind the success of Qrypt
As Founder & CEO of Qrypt, Kevin Chalker coordinates the company’s global business development efforts, build strategic partnerships, and maintains client relationships. Additionally, Kevin serves as the Chairman of the Board of Directors of Barcelona-based Quside, a quantum technologies manufacturer for connected devices.