Be Quantum-Ready Today

We’ve got your data covered … For encrypting data at rest, Cord3 only uses symmetric cryptography. Cord3 uses the Advanced Encryption Standard (AES) algorithm with 256-bit keys. We’ve got your data covered against future advances in quantum computing that are projected to “completely break” widely used algorithms like RSA and ECC.

Security Overlay Icon

Transparent Encryption

“Why is encryption software so horrid to use?” The long answer to that question is complex and diverse. The short answer is that encryption comes in two fundamental forms and one of the forms is actually easy to use – that form is “in transit” encryption, like SSL and VPN. The second form – encryption “at rest” – is a completely different story.

Cord3’s Encryption

Quantum computers are only projected to “completely break” public-key cryptography algorithms. Quantum computers are not projected to be able to compromise good symmetric cryptography algorithms, such as the Advanced Encryption Standard (AES) algorithm used by Cord3 and many other encryption technologies, provided strong encryption keys are used.

How Strong are 256-bit Symmetric Keys?

Using strong, random symmetric keys means an attacker –even one using a quantum computer years from now –has to search through an incredibly large number of keys to be able to find the right one. Even the most powerful conventional computers and quantum computers conceivable would require many, many millions of years to find a key.