<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://news.samsung.com/au/wp-content/plugins/btr_rss/btr_rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>Post-quantum cryptography &#8211; Samsung Newsroom Australia</title>
		<atom:link href="https://news.samsung.com/au/tag/post-quantum-cryptography/feed" rel="self" type="application/rss+xml" />
		<link>https://news.samsung.com/au</link>
        <image>
            <url>https://img.global.news.samsung.com/image/newlogo/logo_samsung-newsroom_au.png</url>
            <title>Post-quantum cryptography &#8211; Samsung Newsroom Australia</title>
            <link>https://news.samsung.com/au</link>
        </image>
        <currentYear>2025</currentYear>
        <cssFile>https://news.samsung.com/au/wp-content/plugins/btr_rss/btr_rss_xsl.css</cssFile>
		<description>What's New on Samsung Newsroom</description>
		<lastBuildDate>Thu, 02 Apr 2026 13:11:26 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>The First Step to a Quantum-Safe Future with Samsung Knox</title>
				<link>https://news.samsung.com/au/the-first-step-to-a-quantum-safe-future-with-samsung-knox?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 17 Feb 2025 12:10:17 +0000</pubDate>
						<category><![CDATA[Mobile & wearables]]></category>
		<category><![CDATA[Enhanced Data Protection]]></category>
		<category><![CDATA[galaxy s25]]></category>
		<category><![CDATA[Galaxy S25 Series]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Post-quantum cryptography]]></category>
		<category><![CDATA[s25]]></category>
		<category><![CDATA[Samsung Knox]]></category>
                <guid isPermaLink="false">https://bit.ly/430rBIy</guid>
									<description><![CDATA[&#160; Samsung Electronics has been working on a new form of cutting-edge mobile security, starting from the Galaxy S25 series. Known as post-quantum]]></description>
																<content:encoded><![CDATA[<p><img class="size-large wp-image-6332 aligncenter" src="https://img.global.news.samsung.com/au/wp-content/uploads/2025/02/Samsung_PQC_image_final-1024x576.jpg" alt="" width="1024" height="576" srcset="https://img.global.news.samsung.com/au/wp-content/uploads/2025/02/Samsung_PQC_image_final-1024x576.jpg 1024w, https://img.global.news.samsung.com/au/wp-content/uploads/2025/02/Samsung_PQC_image_final-728x410.jpg 728w, https://img.global.news.samsung.com/au/wp-content/uploads/2025/02/Samsung_PQC_image_final-1000x563.jpg 1000w, https://img.global.news.samsung.com/au/wp-content/uploads/2025/02/Samsung_PQC_image_final-768x432.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>&nbsp;</p>
<p>Samsung Electronics has been working on a new form of cutting-edge mobile security, starting from the Galaxy S25 series. Known as post-quantum cryptography (PQC), the technology uses advanced algorithms to with a goal to protect against the potential risks that quantum computing poses to traditional encryption methods.</p>
<p>&nbsp;</p>
<p>Samsung Newsroom explored the future of digital security to understand why Samsung is already taking these protective measures.</p>
<p>&nbsp;</p>
<h3><strong>Eyes on the Horizon</strong></h3>
<p>Quantum computing represents one of the most transformative fields in modern technology, offering unparalleled problem-solving capabilities. By harnessing the power of quantum computers, complex challenges can be solved exponentially faster than with traditional computing — unlocking breakthroughs in numerous industries from medicine to logistics. For instance, quantum algorithms could streamline supply chains or improve punctuality in transportation systems.</p>
<p>&nbsp;</p>
<p>However, this immense computational power comes with risks. Because quantum algorithms have the potential to break certain encryption methods used to safeguard today’s data, addressing this vulnerability is critical to ensuring data protection in the future.</p>
<p>&nbsp;</p>
<p>While quantum computing is not expected to reach full-scale implementation immediately, early action is essential to protection against “harvest now, decrypt later” threats — where attackers collect data now to decrypt it with future quantum capabilities.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>Redefining Standards of </strong><strong>Defen</strong><strong>s</strong><strong>e</strong></h3>
<p>&nbsp;</p>
<p>Samsung has been working on PQC to ensure encrypted data remains secure in a quantum-powered world.</p>
<p>&nbsp;</p>
<p>The company <a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> to defend against quantum computer attacks. For example, the <span>ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) algorithm</span> employs lattice-based mathematics — complex multidimensional structures that make encryption keys exceptionally difficult to solve, even for quantum computers. Ideal for secure communication between connected devices, the algorithm provides robust security while optimising performance and minimising data exchange.</p>
<p>&nbsp;</p>
<p>NIST’s PQC standards secure a wide range of electronic information from confidential emails to e-commerce transactions. For Samsung, they are a way to protect cloud data against quantum threats.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>Samsung’s Strategic Approach</strong></h3>
<p><strong> </strong></p>
<p>Committed to protecting user data as technologies such as quantum computing evolve, Samsung is introducing Post-Quantum <span><a href="https://news.samsung.com/global/the-knox-journals-ensure-the-data-you-share-stays-private" target="_blank" rel="noopener">Enhanced Data Protection (EDP)</a></span> to Samsung Knox Matrix — the company’s leading protection for connected device ecosystems.</p>
<p>&nbsp;</p>
<p>Samsung’s <span>EDP</span> feature currently provides end-to-end encryption for user data when backing up, restoring or syncing personal information through Samsung Cloud.</p>
<p>&nbsp;</p>
<p>With the integration of PQC technology to Knox Matrix, another layer of protection has been added — setting a new standard for cloud security on mobile devices. Knox Matrix’s cross-device compatibility will ensure seamless quantum-safe protection for Samsung Cloud backups and synced data across smartphones, TVs and digital appliances.</p>
<p>&nbsp;</p>
<p>This feature is available on the new Galaxy S25 series as the first Samsung device operating on <span><a href="https://news.samsung.com/global/samsung-one-ui-7-enhances-security-and-privacy-in-the-age-of-ai-giving-users-greater-transparency-and-choice" target="_blank" rel="noopener">One UI 7</a></span>, giving Galaxy users enhanced protection.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>Samsung Leading a Secure Future</strong></h3>
<p><strong> </strong></p>
<p>In an ever-evolving digital landscape, preparing for potential threats is not an option but a necessity. As quantum computing looms on the horizon, the need to protect data has become increasingly clear.</p>
<p>&nbsp;</p>
<p>Moving forward, Samsung will continue to pioneer the mobile security industry and create a future where users can enjoy a connected world with added peace of mind.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> NIST has <span><a href="https://www.federalregister.gov/public-inspection/2024-17956/issuance-of-federal-information-processing-standards">finalized its principal set of encryption algorithms</a></span> designed to withstand cyberattacks from quantum computers. Built for the future, these new standards are specified in the first completed standards from NIST’s Post-Quantum Cryptography (PQC) standardization project.</p>
<p><em><u>Bibliography</u></em></p>
<p><em>Announcing Issuance of Federal Information Processing Standards (FIPS) FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism Standard, FIPS 204, Module-Lattice-Based Digital Signature Standard, and FIPS 205, Stateless Hash-Based Digital Signature Standard. (2024, August 14). Federal Register.</em></p>
<p><em>Retrieved from:<span> </span><a href="https://www.federalregister.gov/documents/2024/08/14/2024-17956/announcing-issuance-of-federal-information-processing-standards-fips-fips-203-module-lattice-based">https://www.federalregister.gov/documents/2024/08/14/2024-17956/announcing-issuance-of-federal-information-processing-standards-fips-fips-203-module-lattice-based</a></em></p>
<p><em>National Institute of Standards and Technology. (2025, January 2). NIST.</em></p>
<p><em>Retrieved from:<span> </span><a href="https://www.nist.gov/">https://www.nist.gov/</a></em></p>
<p><em>NIST Releases First 3 Finalised Post-Quantum Encryption Standards. (2024). NIST.</em></p>
<p><em>Retrieved from:<span> </span><a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards</a></em></p>
]]></content:encoded>
																				</item>
			</channel>
</rss>
