DarkMatter joins the cryptographic community
Global cryptographers are working with research institutions to develop encryption technology
DarkMatter has expanded the depth of its research to develop the highest level cryptographic algorithms in an area known as post-quantum cryptography.
The cyber-security firm is working alongside global research institutions and notable mathematicians, who possess protected patents in cryptography and security algorithms in their names. The research team will consist of PhD holders in revolutionary research, including quantum mechanics and D-wave computing, and who have working renowned organisations such BlackBerry, IBM, Motorola, and the National Security Agency.
Polynomial-time quantum algorithms for attacking cryptographic standards based on RSA and Elliptic Curve Discrete Logarithms are a reality. Hence, the team's effort is fundamental to meeting the future requirements of asymmetric cryptography and transition to "Quantum Resistant" cryptographic algorithms that are expected to be resistant to cryptanalysis by quantum methods.
Faisal Al Bannai, founder and chief executive officer, said: "Our focus is to reinvent the future of cyber security through leading-edge research by developing products that offer new capabilities and heightened protection. Secure encryption is a key focus area and we have assembled a best-in-class team of renowned cryptographers to work on developing the highest integrity in this area. It is also important for us to conduct this important research from our base in the UAE, echoing the innovative culture of the country."
Dr. Najwa Aaraj, senior vice president of Special Projects at DarkMatter, added: "Recent ground breaking research efforts on electrons quantum behaviours, photons absorption based on shape and wavelength variability, and light-matter interactions patterns are strong indicators that quantum computers are a likely reality within the next five years.
"Hence, it is important to transition to post-quantum crypto as soon as possible, re-implement existing public key infrastructure and strengthen symmetric algorithms used. This will enable us to preserve the confidentiality of keys exchanged that are used for symmetric encryption, the security and authenticity of digital signatures, and the security of encryption. DarkMatter post-quantum crypto-focused research and development efforts will enable such a transition as we design, develop and implement algorithms, deployable on a wide range of platforms that provide signatures, encryption, and key exchange," she added.