Frequently asked questions

Do you have questions?

Then welcome to our FAQ page, where we address the most common questions about cyber security and our cutting-edge cyber security solutions.
At CyberHive, we are committed to providing you with the solutions and information you need to protect your digital assets.

There has been a significant amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. When quantum computers are available, they will be able to break many of the public-key encryption standards in use today.

The goal of post-quantum cryptography (also called quantum-safe cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.

For more information see: https://csrc.nist.gov/projects/post-quantum-cryptography

What is post quantum cryptography?

There has been a significant amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. When quantum computers are available, they will be able to break many of the public-key encryption standards in use today.

The goal of post-quantum cryptography (also called quantum-safe cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.

For more information see: https://csrc.nist.gov/projects/post-quantum-cryptography

Get in touch

If you have a question or would like some more information, contact us today.