Monday, 2 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > NordVPN implements post-quantum cryptography in Linux App
Cloud Computing

NordVPN implements post-quantum cryptography in Linux App

Last updated: October 16, 2024 12:38 am
Published October 16, 2024
Share
Cloud Computing News
SHARE

NordVPN has built-in post-quantum cryptography into its Linux software, marking an early adoption of this expertise within the client VPN market.

This transfer addresses rising considerations concerning the potential for future quantum computer systems to interrupt present encryption requirements, probably compromising delicate knowledge.

The replace, launched in late September, introduces post-quantum cryptography to NordVPN’s Nordlynx protocol. It aligns with the newest Nationwide Institute of Requirements and Know-how (NIST) tips for quantum-resistant encryption. Whereas quantum computer systems able to breaking present encryption are possible years away, this replace represents a proactive step in cybersecurity.

The Linux app serves as a testbed for NordVPN, permitting the corporate to assemble knowledge on how post-quantum cryptography impacts connection instances and speeds. This data will inform the eventual implementation throughout NordVPN’s whole software suite.

For context, quantum computing already reveals the potential to far surpass right now’s quickest programs by harnessing the rules of quantum mechanics to carry out calculations. That’s the reason it’s predicted that quantum computer systems will probably be used to mannequin molecules to assist remedy illnesses like most cancers, advance area exploration, and probably break fashionable encryption protocols. 

Nevertheless, such superior processing powers can inevitably carry extra important dangers than we face right now with digital computer systems. Subsequently, the cybersecurity trade’s problem is determining methods to outrun quantum computing’s huge decryption skills. 

“To place it in perspective, right now’s encryption strategies, like RSA, can take conventional computer systems tons of of years to crack, whereas quantum computer systems might bypass them in mere seconds,” NordVPN mentioned, including that such capabilities pose a critical risk to people, companies and governments. 

See also  Cybersecurity trends and how to navigate them

A lot in order that, based on Marijus Briedis, CTO at NordVPN, “cybercriminals might already be intensifying what is called ‘harvest now, decrypt later’ assaults”. In easy phrases, unhealthy actors try to build up huge portions of encrypted knowledge and decrypt them as soon as quantum expertise is developed.

Whereas NordVPN is among the many first client VPN suppliers to implement post-quantum cryptography, it’s a part of a broader development. Main tech firms and authorities companies additionally put money into quantum-resistant applied sciences, recognizing the necessity to put together for future cryptographic challenges.

The transfer in direction of post-quantum cryptography is about extra than simply rapid safety and flexibility. As Briedis places it, “This launch initiates our transition to new-generation encryption, specializing in long-term safety for our customers.”

“With this launch, we begin a significant transition to new-generation encryption of all our functions, offering long-term safety for our customers,” Briedi defined. Nevertheless, implementing post-quantum encryption is difficult. 

The method is advanced and resource-intensive, usually requiring bigger key sizes and signatures that may improve computational overhead. This might probably affect VPN velocity and efficiency, particularly in high-throughput environments. 

“These technical challenges are the rationale for the gradual implementation,” Briedis famous. “We wish to guarantee the very best degree of person expertise when it comes to connection time and velocity throughout the transition.”

Because the cryptographic panorama evolves, NordVPN is specializing in crypto-agility – the power to swiftly adapt to new cryptographic requirements. The corporate goals to place itself on the forefront of offering seamless and safe quantum-resistant VPN connections when needed.

See also  A Guide to Open Source Data Center Asset Management Software

See additionally: US examines safety dangers posed by China Telecom and China Cellular’s operations

Need to study extra about cybersecurity and the cloud from trade leaders? Try Cyber Security & Cloud Expo going down in Amsterdam, California, and London. Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.

Tags: cybersecurity

Source link

TAGGED: app, Cryptography, Implements, Linux, NordVPN, Postquantum
Share This Article
Twitter Email Copy Link Print
Previous Article Google thinks the public sector can do better than Microsoft’s ‘security failures’ Password manager makers want to let you securely transfer passkeys
Next Article New app performs real-time, full-body motion capture with a smartphone New app performs real-time, full-body motion capture with a smartphone
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Market challenges rise by over a third as data centres battle mounting pressure

9 in 10 (88%) UK knowledge centres face rising challenges resulting from rising market strain,…

December 13, 2024

France’s Versailles unveils AI-powered talking statues

Credit score: Patricia Bozan from Pexels Guests to France's famed Palace of Versailles can now…

June 25, 2025

Sparrow Quantum Raises €21.5M for EU Photonic Chip Innovation

Danish startup Sparrow Quantum has secured €21.5 million in Sequence A funding to advance its…

April 13, 2025

Biden to Further Limit Nvidia AI Chip Exports in Final Push

(Bloomberg) -- President Joe Biden’s administration plans a further spherical of restrictions on the export…

January 10, 2025

Akamai extends segmentation solution to hybrid cloud environments

Cloud computing firm Akamai Applied sciences, has prolonged its segmentation answer, Akamai Guardicore Segmentation, to…

March 11, 2024

You Might Also Like

What is Famous Labs? Building an autonomous creation ecosystem
Cloud Computing

What is Famous Labs? Building an autonomous creation ecosystem

By saad
Thomson Reuters, RBC embed AI into enterprise cloud workflows
Cloud Computing

Thomson Reuters, RBC embed AI into enterprise cloud workflows

By saad
Tune Talk’s cloud-native shift shows telecom becoming software-driven
Cloud Computing

Tune Talk’s cloud-native shift signals software-driven telecom

By saad
Genesys prepares EU deployment on AWS European Sovereign Cloud
Cloud Computing

Genesys plans EU deployment on AWS European Sovereign Cloud

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.