EspaƱol


Post-Quantum Encrypter. IT Security and Quantum Computers


Computer Security after Quantum Computers. Shor's Algorithm.

The recent development of Quantum Computers represents a breach in the security of the data protection systems we use, travel through, and store via computing.

Financial, healthcare, and intellectual property reports, documents from public bodies' websites, academic papers, technical designs, industrial and creative prototypes, cryptocurrencies, law firm documentation, and even the Internet sites and protocols, applications, and confidential files generated daily by companies, businesses, and Small and Medium-Sized Enterprises (SMEs), all have their security and confidentiality at risk.

Quantum Computer developed by Google
          
Quantum Computer developed by IBM

In other words, the current computer security systems most commonly used have been threatened by the development of Quantum Computers. These computers can effortlessly break the current encryption systems that protect our data in just a matter of hours or minutes, thus clearly compromising the confidentiality of private documents.

Mr. Peter Shor and his Algorithm

Mr. Peter Shor of the Massachusetts Institute of Technology (MIT) is a notable mathematical researcher and inventor of Shor's Algorithm, the algorithm that can break most current encryption algorithms in minutes.


Mathematician Mr. Peter Shor at MIT


Consolidated Systems in Danger: The Post-Quantum Era

Data protection and encryption systems that have been well established over the years in countless countries, such as the well-known and widespread RSA, encryption algorithm which has been used by governments, multinational companies, different businesses and entities to protect the privacy of their files, are exposed after the development of Quantum Computers in conjunction with Shor's Algorithm, which has given rise to the Post-Quantum Era of Cryptography, also known in English as Post-Quantum Cryptography or PQC for short.

This is why Cybersecurity companies must rethink the design of new encryption systems that overcome the undeniable threat of Post-Quantum Cryptography (PQC).
Our PQEncrypter, a name that stands for Post-Quantum Encrypter, was designed with this in mind. It leaves not only Quantum Computers but also classical computers out of the game, as they cannot decrypt the messages from our encrypter, no matter how much computing time they dedicate to it.

See and learn about the features of PQEncrypter and how it can overcome the PQC phenomenon, reliably protecting the security of SMEs most precious and sensitive files, even if they are stored on remote Servers, in the so-called Cloud.

< Encrypting Documents       Learn about the features of our powerful PQEncrypter >