Encryption
Bibliography
Bibliography
https://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/
Double Encryptionhttps://www.ipswitch.com/blog/double-encryption-is-it-more-secure-or-dangeroushttps://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption
Encryption at Resthttps://scottarc.blog/2024/06/02/encryption-at-rest-whose-threat-model-is-it-anyway/
Double Encryptionhttps://www.ipswitch.com/blog/double-encryption-is-it-more-secure-or-dangeroushttps://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption
Encryption at Resthttps://scottarc.blog/2024/06/02/encryption-at-rest-whose-threat-model-is-it-anyway/
TODO
FIPS140-2 (Level 2, Level 3 etc)
PCI HSM
e-Tokens
smartcards