Glossary

Explore key terms, acronyms, and concepts shaping the future of cybersecurity and post-quantum cryptography. This glossary helps you understand the language behind true randomness, entropy generation, and quantum-grade security — making it easier to follow the technology powering Real Random’s innovations.

Asymmetric Cryptography

A type of encryption that uses two keys: a public key to encrypt and a private key to decrypt.

Example:

RSA and ECC are asymmetric systems vulnerable to quantum attacks.

Brownian Motion

Random movement of particles in a fluid, used by Real Random hardware to generate true physical randomness.

Example:

Our entropy units capture Brownian motion to create unpredictable cryptographic keys.

CRQC (Cryptographically Relevant Quantum Computer)

A future large-scale quantum computer powerful enough to break current public-key cryptography.

Example:

Security teams plan for the CRQC era by adopting post-quantum cryptography.

Digital Signature

A cryptographic proof that a message or file hasn’t been altered and comes from a trusted source.

Example:

Firmware updates rely on digital signatures to prevent tampering.

EaaS (Entropy-as-a-Service)

A cloud service delivering high-quality random numbers for secure key generation.

Example:

Hospitals can use EaaS to protect telehealth communications without installing hardware.

Entropy

A measure of randomness or unpredictability used in cryptography.

Example:

Keys generated with low entropy are vulnerable to attack.

Forward Secrecy

A security property ensuring past communications remain secure even if future keys are compromised.

Example:

PQC protocols need high entropy to preserve forward secrecy.

Keyless Encryption

An encryption method that secures data without relying on traditional key exchange, instead using shared entropy.

Example:

Real Random supports keyless encryption to reduce key management risks.

ML-KEM (Module Lattice–Key Encapsulation Mechanism)

One of the NIST-selected post-quantum algorithms for secure key exchange.

Example:

Google Chrome now uses ML-KEM for PQC-protected TLS connections.

Nonce

A one-time random value used in cryptographic protocols to prevent replay attacks.

Example:

VPN tunnels generate fresh nonces from entropy sources for each session.

PQC (Post-Quantum Cryptography)

New cryptographic algorithms designed to resist both classical and quantum computer attacks.

Example:

NIST has standardized PQC algorithms for digital signatures and key exchange.

Pseudo-Random Number Generator (PRNG)

A software algorithm that produces numbers that look random but are ultimately predictable.

Example:

Many IoT devices still rely on PRNGs, leaving them vulnerable if entropy is weak.

QRNG (Quantum Random Number Generator)

A device that uses quantum physics to generate random numbers.

Example:

Unlike QRNGs that need lab conditions, Real Random works in standard data centers.

Quantum-Grade

A security or randomness standard designed to withstand quantum computing attacks.

Example:

Real Random hardware produces quantum-grade entropy for post-quantum encryption systems.

RSA (Rivest–Shamir–Adleman)

A widely used public-key cryptosystem vulnerable to quantum factorization attacks.

Example:

RSA certificates will be broken quickly once CRQCs are built.

Seed Value

An initial random input used to generate cryptographic keys.

Example:

Real Random entropy provides verifiable seed values for key generation.

Store Now, Decrypt Later

An attack strategy where encrypted data is captured today and held until quantum computers can break it.

Example:

Healthcare data stolen now could be decrypted years later without PQC.

TLS (Transport Layer Security)

The protocol securing most internet traffic, including web browsing and email.

Example:

TLS handshakes require high-quality entropy to protect against eavesdropping.

TRNG (True Random Number Generator)

A hardware device that generates randomness from physical processes, not algorithms.

Example:

Real Random TRNGs produce entropy that cannot be reverse-engineered.

Y2Q (Years to Quantum)

A shorthand for the expected timeline when quantum computers can break classical cryptography.

Example:

Experts estimate Y2Q could arrive in the next 10–15 years.