• About
  • Subscribe
  • Contact
Tuesday, January 27, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Quantum computing encryption comes to the device

FutureCISO Editors by FutureCISO Editors
June 29, 2023

Quantinuum H2 hardware

Share on FacebookShare on Twitter

The risk of cyberattacks compromising organisations continues to grow. As cyber criminals uncover new techniques to exploit connected systems and their data, even the cryptographic foundations of cybersecurity measures remain vulnerable to advanced threats.

Cryptographic keys created using current typical methods deployed by organisations around the world are not provably unpredictable, leaving encrypted data and systems potentially at risk of devastating attacks.

Quantinuum’s quantum-computing-hardened cryptographic key enhancement solution provably minimises the risk that businesses generate and use vulnerable encryption keys to protect encrypted data.

Dr Rajeeb Hazra

“While quantum computing has the potential to render current encryption algorithms obsolete, posing a significant challenge to businesses and individuals alike, already today sophisticated attackers can take advantage of vulnerable encryption keys,” said Dr Rajeeb Hazra, CEO of Quantinuum. “With our Quantum Origin Onboard and the overall Quantum Origin platform, organisations can fortify defences across multiple endpoints and embrace the possibilities of a quantum-secure future."

Strengthening encryption at the device level

Quantum Origin Onboard is the first and only commercially available enterprise software solution capable of delivering quantum-computing-hardened key enhancement. It can be installed directly onto devices and used to help deliver unparalleled foundational-level protection.

Quantum Origin Onboard brings cutting-edge, enterprise-level security that integrates directly into connected devices without the need for additional hardware upgrades. This unique approach ensures that devices in any environment, online or offline, can generate quantum-computing-hardened keys to continually maximise the strength of encryption measures protecting devices.

How it works

Quantum Origin Onboard embeds a quantum seed, created by Quantinuum's H-series quantum computer, into devices. The seed is a string of provably unpredictable numbers, which enhance a device's capability to generate strong and secure keys.

Duncan Jones

“Enterprises are recognising they can build unprecedented resilience by adopting quantum-computing-hardened cryptographic keys,” said Duncan Jones, head of cybersecurity at Quantinuum. “This is a paradigm shift, and enterprises in critical industries are embracing the opportunity to minimise a risk to one of their attack surfaces, specifically device-level encryption on internet-connected products that might be in the field for a decade.”

Related:  ZTE’s 5G NR product obtained NESAS cybersecurity certification
Tags: encryptionQuantinuumQuantum Computing
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • PodChats for FutureCISO: Practical defence strategies against industrialised cyber threats
  • More Singapore firms setting up own SOCs
  • 2026: When autonomous AI transforms cyber attacks and security models
  • Recalibrating CISO strategies amid AI complexity
  • Study reveals urgent need for JIT privileged access amid AI expansion

Categories

  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl