We’ve got your data covered … For encrypting data at rest, Cord3 only uses symmetric cryptography. Cord3 uses the Advanced Encryption Standard (AES) algorithm with 256-bit keys. We’ve got your data covered against future advances in quantum computing that are projected to “completely break” widely used algorithms like RSA and ECC.
Quantum computers are only projected to “completely break” public-key cryptography algorithms. Quantum computers are not projected to be able to compromise good symmetric cryptography algorithms, such as the Advanced Encryption Standard (AES) algorithm used by Cord3 and many other encryption technologies, provided strong encryption keys are used.
Using strong, random symmetric keys means an attacker –even one using a quantum computer years from now –has to search through an incredibly large number of keys to be able to find the right one. Even the most powerful conventional computers and quantum computers conceivable would require many, many millions of years to find a key.
- Protect Your Data from Privileged Credential Attacks – Detecting Attacks is Too Late!July 5, 2019 - 11:05 am
- LightNeuron malware – Cord3’s Solution!May 15, 2019 - 2:44 pm
- The Cloud & Privileged Credential AbuseFebruary 28, 2019 - 4:23 pm
- Cord3 to Exhibit at RSA Conference 2019February 28, 2019 - 2:34 pm
900 Morrison Drive Suite 206
+1 343 488 8720