Sunday, 22 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > NordVPN implements post-quantum cryptography in Linux App
Cloud Computing

NordVPN implements post-quantum cryptography in Linux App

Last updated: October 16, 2024 12:38 am
Published October 16, 2024
Share
Cloud Computing News
SHARE

NordVPN has built-in post-quantum cryptography into its Linux software, marking an early adoption of this expertise within the client VPN market.

This transfer addresses rising considerations concerning the potential for future quantum computer systems to interrupt present encryption requirements, probably compromising delicate knowledge.

The replace, launched in late September, introduces post-quantum cryptography to NordVPN’s Nordlynx protocol. It aligns with the newest Nationwide Institute of Requirements and Know-how (NIST) tips for quantum-resistant encryption. Whereas quantum computer systems able to breaking present encryption are possible years away, this replace represents a proactive step in cybersecurity.

The Linux app serves as a testbed for NordVPN, permitting the corporate to assemble knowledge on how post-quantum cryptography impacts connection instances and speeds. This data will inform the eventual implementation throughout NordVPN’s whole software suite.

For context, quantum computing already reveals the potential to far surpass right now’s quickest programs by harnessing the rules of quantum mechanics to carry out calculations. That’s the reason it’s predicted that quantum computer systems will probably be used to mannequin molecules to assist remedy illnesses like most cancers, advance area exploration, and probably break fashionable encryption protocols. 

Nevertheless, such superior processing powers can inevitably carry extra important dangers than we face right now with digital computer systems. Subsequently, the cybersecurity trade’s problem is determining methods to outrun quantum computing’s huge decryption skills. 

“To place it in perspective, right now’s encryption strategies, like RSA, can take conventional computer systems tons of of years to crack, whereas quantum computer systems might bypass them in mere seconds,” NordVPN mentioned, including that such capabilities pose a critical risk to people, companies and governments. 

See also  Data Centers Are Turning to Aspirating Smoke Detection

A lot in order that, based on Marijus Briedis, CTO at NordVPN, “cybercriminals might already be intensifying what is called ‘harvest now, decrypt later’ assaults”. In easy phrases, unhealthy actors try to build up huge portions of encrypted knowledge and decrypt them as soon as quantum expertise is developed.

Whereas NordVPN is among the many first client VPN suppliers to implement post-quantum cryptography, it’s a part of a broader development. Main tech firms and authorities companies additionally put money into quantum-resistant applied sciences, recognizing the necessity to put together for future cryptographic challenges.

The transfer in direction of post-quantum cryptography is about extra than simply rapid safety and flexibility. As Briedis places it, “This launch initiates our transition to new-generation encryption, specializing in long-term safety for our customers.”

“With this launch, we begin a significant transition to new-generation encryption of all our functions, offering long-term safety for our customers,” Briedi defined. Nevertheless, implementing post-quantum encryption is difficult. 

The method is advanced and resource-intensive, usually requiring bigger key sizes and signatures that may improve computational overhead. This might probably affect VPN velocity and efficiency, particularly in high-throughput environments. 

“These technical challenges are the rationale for the gradual implementation,” Briedis famous. “We wish to guarantee the very best degree of person expertise when it comes to connection time and velocity throughout the transition.”

Because the cryptographic panorama evolves, NordVPN is specializing in crypto-agility – the power to swiftly adapt to new cryptographic requirements. The corporate goals to place itself on the forefront of offering seamless and safe quantum-resistant VPN connections when needed.

See also  The AI app builder turning simple prompts into real software

See additionally: US examines safety dangers posed by China Telecom and China Cellular’s operations

Need to study extra about cybersecurity and the cloud from trade leaders? Try Cyber Security & Cloud Expo going down in Amsterdam, California, and London. Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.

Tags: cybersecurity

Source link

TAGGED: app, Cryptography, Implements, Linux, NordVPN, Postquantum
Share This Article
Twitter Email Copy Link Print
Previous Article Google thinks the public sector can do better than Microsoft’s ‘security failures’ Password manager makers want to let you securely transfer passkeys
Next Article New app performs real-time, full-body motion capture with a smartphone New app performs real-time, full-body motion capture with a smartphone
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

AI and holography bring 3D augmented reality to regular glasses

By means of holography and AI, these glasses can show full-color, 3D transferring pictures over…

May 9, 2024

Boost your ROI: The impact of chatbots on marketing

Uncover how chatbots for advertising and marketing can increase your ROI with enhanced engagement and…

November 21, 2024

Arm backs big data center ambitions with migration tools

“Our objective is to make sure builders have complete help and entry to in-depth sources…

April 10, 2025

Goodman Raises $2.6B to Fund Global Data Center Expansion

Goodman Group plans to lift A$4 billion ($2.6 billion) to increase its international community of…

February 21, 2025

Safeguarding data centres with CFD simulation

Gordon Johnson, Senior CFD Supervisor at Subzero Engineering, discusses how CFD simulations might help optimise…

August 9, 2024

You Might Also Like

NTT commits to billions in investment into DCs
Cloud Computing

NTT commits to billions in investment into DCs

By saad
Cloud demand shifts toward AI as enterprise usage deepens
Cloud Computing

Cloud demand shifts toward AI as enterprise usage deepens

By saad
CVS Health builds consumer health platform on Google Cloud
Cloud Computing

CVS Health builds consumer health platform on Google Cloud

By saad
Cyber Security & Cloud Congress North America
Cloud Computing

Cyber Security & Cloud Congress North America 2026

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.