Seqara
Seqara was formed to develop quantum cryptography and implement quantum-resistant cryptographic algorithms for cyber security use by government institutions, corporations, banks, and military forces. Many popular cryptosystems can be cracked using Shor’s Algorithm; an algorithm that employs quantum computation to convert prime number phases expressed as sine waves into factors of large integers thereby solving discrete logarithm problems that many current cryptographic algorithms aim to address.
Although advances in quantum computing offer tremendous opportunities for scientific progress (e.g. material science and machine learning), few people realize that quantum computers could also pose a grave danger to cryptographic algorithms that provide security and privacy protection online today. Cryptography has become an integral component of Internet life; millions rely on it every day for mobile communications, online banking and personal data privacy. Public-key cryptography was instrumental in the growth and establishment of both electronic commerce and the public Internet. Public-key cryptography offers two parties who have never communicated before an effective and secure means to establish private communication channels across non-secure networks (such as the Internet). Public-key cryptography is the foundation for digital signatures, used extensively to protect software updates, online contracts, and electronic identity documents such as Personal Identity Verification (PIV) credentials or passports.

Recent advances in quantum computing indicate that we are approaching another cryptographic algorithm change; one which will likely involve many more systems and stakeholders than any previous migrations. This transformation in IT represents an enormous disruption, impacting virtually every area of digital life – from commerce and social media platforms, through government services and more. Transitions of cryptographic algorithms require careful coordination among many stakeholders who contribute to building and operating the world’s compute infrastructure. By starting early to prepare for these transitions, we can ensure an orderly, less expensive, and minimally disruptive changeover.