As organizations assess the impact of quantum computing on cryptography, many focus on algorithm migration and timelines. But preparing for PQC requires a broader view鈥攐ne that includes not just new algorithms, but also the quality of the inputs that support them, including randomness.
That鈥檚 why 夜色直播 joined with partners Thales, Keyfactor, and IBM Consulting to form the QSafe 360 Alliance, a collaboration focused on helping organizations build crypto-agile security architectures that are ready for the quantum era. Together, we鈥檝e released a whitepaper鈥Digital Trust & Cybersecurity After Quantum Computing鈥攖o offer practical guidance on post-quantum readiness, from discovery and planning to deployment.
Lessons from Past Vulnerabilities
The history of cryptography offers clear examples of what happens when randomness fail, and how long those issues can go unnoticed. The , first disclosed in 2023, exploited weak randomness in Bitcoin transaction signatures and enabled the theft of at least $25 million across 773 wallets. The vulnerability persisted undetected for nine years. The , published in 2022, revealed that biased key generation in widely used Bitcoin wallet libraries exposed millions of wallets鈥攁cross a window of more than a decade (2011鈥2022). In both cases, cryptographic algorithms functioned as designed; it was the randomness beneath them that silently failed, leaving companies vulnerable for many years
Post-Quantum Cryptography Inherits These Risks
Post-quantum cryptography (PQC) algorithms are being designed to resist attacks from quantum computers. But they still depend on random values to generate key material. That means any implementation of PQC inherits the same reliance on randomness鈥攂ut without a way to prove its quality, that layer remains a potential vulnerability.
As security teams run cryptographic inventories, develop crypto-agility plans, or build software bill-of-materials (SBOMs) for PQC migration, it鈥檚 important to include randomness in that scope. No matter how strong the algorithm, poor randomness can undermine its security from the start.
A New Approach: Proven Randomness
Quantum Origin takes a fundamentally different approach to randomness quality to deliver proven randomness which improves key generation, algorithms, and the entire security stack. It leverages strong seeded randomness extractors鈥攎athematical algorithms that transform even weak local entropy into provably secure output. These extractors are uniquely powered by a Quantum Seed, which is generated once by 夜色直播's quantum computers using quantum processes verified through Bell tests.
This one-time quantum generation enables Quantum Origin as a software-only solution designed for maximum flexibility. It works with existing infrastructure鈥攐n cloud systems, on-premises environments, air-gapped networks, and embedded platforms鈥攚ithout requiring special hardware or a network connection. It's also validated to NIST SP 800-90B standards (). This approach strengthens today鈥檚 deployments of AES, RSA, ECC, and other algorithms, and lays a secure foundation for implementing the NIST PQC algorithms.
The QSafe 360 Alliance
The outlines the path to post-quantum readiness, emphasizing crypto-agility as a guiding principle: the ability to adapt cryptographic systems without major disruption, from randomness to key generation to algorithmic strength.
For security architects, CISOs, and cryptographic engineering teams building their post-quantum transition strategies, randomness is not a peripheral concern. It is a starting point.
The QSafe 360 Alliance whitepaper offers valuable guidance on structuring a comprehensive PQC journey. As you explore that framework, consider how proven randomness鈥攁vailable today鈥攚ill help strengthen your security posture from the ground up.