Our team of mathematicians and software engineers are looking at solving some of the industry’s largest security problems. Find out about some of what we do below.
Post Quantum Cryptography
Computers govern our world. Whether browsing at a clothing store, putting a deposit into a bank account, or even ordering food, computers are instrumental in each and every single activity that we do. However, the limits of traditional computing have been reached. Moore’s law is predicted to be dead by the year 2021, while algorithms and processes continue to become even more complex by each passing day. A replacement, however, is already in the works. Quantum computing is the future of computers.
Traditional computers rely on transistors that represent the smallest piece of information, a bit, which can be a zero or a one. In contrast, quantum computers represent information in qubits which can be multiple states simultaneously due to the rules of quantum physics. In quantum physics, subatomic particles can act like waves. However, they can also take on being a particle or a wave, or a particle and a wave in a process known as superposition. As these states scale, exponential computing power is unleashed.
The development of actual quantum computers is still in its infancy. However, experiments have been carried out in which fully working quantum computational operations were executed on a very small number of qubits. This allows quantum computers with a modest number of qubits to rapidly solve problems that would take today’s most powerful computers with millions of bits years to solve like integer factorization using Shor’s algorithm or the simulation of quantum many-body systems. Large-scale functional quantum computers may exist in little as 10 years. The advent of quantum computing would be able to solve certain types of complex problems in machine learning, medicine, and material science that are simply intractable for classical computers today. At the same time, quantum computing will pose a devastating threat to today’s security.
"The mantra of any good security engineer is: 'Security is not a product, but a process.' It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together."
– Bruce Schneier
A Strong Track Record Across Client Verticals
We thrive on engineering creative solutions to complex problems. Envieta has developed and successfully deployed the following types of systems for customers: