• About
  • Subscribe
  • Contact
Tuesday, May 20, 2025
  • Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Quantum computing encryption comes to the device

FutureCIO Editors by FutureCIO Editors
June 29, 2023
Quantinuum H2 hardware

Quantinuum H2 hardware

The risk of cyberattacks compromising organisations continues to grow. As cyber criminals uncover new techniques to exploit connected systems and their data, even the cryptographic foundations of cybersecurity measures remain vulnerable to advanced threats.

Cryptographic keys created using current typical methods deployed by organisations around the world are not provably unpredictable, leaving encrypted data and systems potentially at risk of devastating attacks.

Quantinuum’s quantum-computing-hardened cryptographic key enhancement solution provably minimises the risk that businesses generate and use vulnerable encryption keys to protect encrypted data.

Dr Rajeeb Hazra

“While quantum computing has the potential to render current encryption algorithms obsolete, posing a significant challenge to businesses and individuals alike, already today sophisticated attackers can take advantage of vulnerable encryption keys,” said Dr Rajeeb Hazra, CEO of Quantinuum. “With our Quantum Origin Onboard and the overall Quantum Origin platform, organisations can fortify defences across multiple endpoints and embrace the possibilities of a quantum-secure future."

Strengthening encryption at the device level

Quantum Origin Onboard is the first and only commercially available enterprise software solution capable of delivering quantum-computing-hardened key enhancement. It can be installed directly onto devices and used to help deliver unparalleled foundational-level protection.

Quantum Origin Onboard brings cutting-edge, enterprise-level security that integrates directly into connected devices without the need for additional hardware upgrades. This unique approach ensures that devices in any environment, online or offline, can generate quantum-computing-hardened keys to continually maximise the strength of encryption measures protecting devices.

How it works

Quantum Origin Onboard embeds a quantum seed, created by Quantinuum's H-series quantum computer, into devices. The seed is a string of provably unpredictable numbers, which enhance a device's capability to generate strong and secure keys.

Duncan Jones

“Enterprises are recognising they can build unprecedented resilience by adopting quantum-computing-hardened cryptographic keys,” said Duncan Jones, head of cybersecurity at Quantinuum. “This is a paradigm shift, and enterprises in critical industries are embracing the opportunity to minimise a risk to one of their attack surfaces, specifically device-level encryption on internet-connected products that might be in the field for a decade.”

Related:  How companies can prepare for a looming quantum computing threat
Tags: encryptionQuantinuumQuantum Computing
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Equinix signs first renewable energy PPA in Japan
  • Vertiv launches new cooling system for AI applications
  • Informatica launches new AI-powered cloud integration and master data management capabilities
  • SG businesses are investing in emerging technology, but ICT suppliers must adapt strategies, study finds
  • ASEAN application development landscape: Navigating challenges and embracing opportunities

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
  • Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe