What Is Data Encryption? Your Comprehensive Guide to Encrypting Data

Modern businesses generate, exchange, and store massive amounts of sensitive data managed in the cloud or on connected servers, most of which they want to keep confidential and secure. Data encryption is a widely used and highly effective security method to keep all data secure.

What is Data Encryption?

Data encryption is the basic building block in cybersecurity. It involves scrambling text or data into an uninterpretable, unreadable, encoded format called ciphertext. Basically, this means taking readable information and transforming it so that it appears totally random. Users can only read or process encrypted data after it has been decrypted using a secret key. The more complex the cryptographic key, the more secure the encryption (more on this later).

How Data Encryption is Used

Businesses typically rely on enterprise-grade data encryption methods to encrypt their data. Off-the-shelf software allows you to start securing your business data right away without worrying about the implementation details.

Data encryption technologies can be used to protect various types of data, including but not limited to:

  • Data at rest and in transit
  • Data stored on in-office systems or employee work devices
  • Data stored on on-premises data centers or third-party cloud environments
  • Data that relates to business assets, research, intellectual property, and customers

How Does Data Encryption Work?

As mentioned above, encryption algorithms use cryptographic keys to modify data and make it uninterpretable to others. Cryptographic keys dictate the logic of how the original data is encrypted and decrypted.

To help you better understand how data encryption methods work, let’s consider the Caesar cipher – one of the simplest encryption algorithms out there. Its most known use case is text encryption.

The Caesar cipher works by taking each letter in the original message (the plaintext) and replacing it with a letter that’s a certain distance away from it in the alphabet. That distance can be arbitrary; for example, if you chose to shift the letters by 2 positions to the right, the letter A would become the letter C, B would become D, and so on. In the Caesar cipher, the distance of the shift (e.g., 2) is the cryptographic key.

Here’s a really simple example of a Caesar shift by 2 to the right.

Plaintext: The message has been delivered.

Ciphertext: Vjg oguucig jcu dggp fgnkxgtgf.

To decrypt the message, you would need to shift the ciphertext by 2 positions to the left.

Mathematically, the Caesar cipher encrypts English plaintext using the following function:

While decryption is done like this:

The Caesar cipher isn’t even remotely secure by today’s standards, but it’s great for demonstrating how encryption works.

Business-grade encryption algorithms work similarly – they use mathematical functions to encrypt and decrypt data. But these functions are much more complex and use much longer encryption keys (that can be very difficult to guess), leverage pseudo-random numbers, and can rearrange different portions of data.

Benefits of Data Encryption

Security Across Devices

Businesses can apply data encryption technologies across their entire infrastructure, starting from on-premises hardware – like servers – and ending with employees’ personal devices. This ensures total protection of corporate data while at rest,  no matter where it’s located.

Secure Data Transfer and Communications

Encryption can protect your data at rest and while in transit. So even if hackers do manage to intercept confidential data while it’s being sent from one device to another, encryption can make that data uninterpretable to them.

Protection of Lost or Stolen Devices

Employees can be quite careless with their work devices, even often bringing them along with them on vacation. Interns and C-level employees can be especially susceptible to this, with having lost their device on vacation, according to a survey by Snow Software. While human error might be difficult to prevent, encryption can protect data on devices that have gone missing.

Consumer Trust

Today, people are more worried about their online data and privacy than ever before. Among Americans, nearly 72% are “very concerned” or “extremely concerned” about their online privacy.

Online users cannot control where their data is used and stored. They can’t even tell if their personal data is actually secure in the hands of tech companies. By encrypting the data of your customers even when not legally required to do so, you can increase their level of trust in your business.

3 Main Reasons Why We Need Data Encryption


Data encryption technology lets us keep our private data confidential and secure from anyone who might want to exploit it for their own gain or make use of it for other nefarious purposes. The kinds of private data we can protect through encryption include passwords, health and financial information, or trade secrets and intellectual property.


Cyber-attacks and data breaches have become commonplace and represent an ongoing risk for every business. Despite their best efforts to secure their data, many companies still fall victim to sophisticated attacks and end up losing sensitive information. If data is encrypted before it’s stolen, the risk of it being accessed and exploited is less likely.

Data Protection Regulations

Data encryption methods ensure that organizations stay compliant with the relevant regulatory standards and laws that apply to them. These differ from industry to industry. For example, in healthcare, the Health Insurance Portability and Accountability Act (HIPAA) requires all providers to encrypt sensitive patient data. Retail businesses have to abide by the Fair Credit Practices Act (FCPA) and other consumer protection rules. Higher education institutions are bound by the Family Education Rights and Privacy Act (FERPA) which is designed to ensure that student records remain confidential.

Types of Data Encryption

The two most common data encryption methods are public key (also known as asymmetric) encryption and private key (or symmetric) encryption.

Symmetric Encryption (Private Key Encryption)

In symmetric encryption, only one secret symmetric key is used to encrypt the plaintext and decrypt the cipher text. It provides a way to encrypt information quickly, so it’s ideal for use cases where encryption/decryption speed and latency are important. Additionally, symmetric encryption is great for encrypting huge volumes of data simultaneously.

On the other hand, symmetric keys are considered less secure than asymmetric keys. If you use the same symmetric key across different devices and types of data, your entire network can be compromised if the key is stolen or leaked.

Employees and network devices need to have direct access to the symmetric key to be able to encrypt data. This means that you have to somehow send the symmetric key to the relevant parties, which means that there is a risk of the key being stolen in transit.

Asymmetric Encryption (Public Key Encryption)

Asymmetric encryption, also known as Public Key Cryptography, makes use of two separate cryptographic asymmetric keys to encrypt and decrypt data. These two keys are referred to as a “public key” and a “private key.”

The private and public keys are mathematically linked with each other. If someone wanted to send a protected message to you, they would need to use your public key to encrypt it. And after you receive the message, you would need to use your private key to decrypt it.

Because the public key is visible to others, anyone can send you an encrypted message without exchanging any keys with you. This is one of the reasons why asymmetric encryption is considered more secure than symmetric encryption.

With that said, asymmetric encryption is typically slower than symmetric encryption. Because of this, it usually isn’t used to directly encrypt data in bulk. Instead, whenever speed is a concern, you can use asymmetric encryption to encrypt and securely transfer symmetric encryption keys and then use them to encrypt your data. And to make sure that the keys are coming from a trusted source, asymmetric encryption can also be used to generate digital certificates that can authenticate the communication parties.

Another notable issue with asymmetric encryption is that it’s believed to be vulnerable to future attacks from quantum computers. Quantum computers will be powerful enough to simply derive private keys from their associated public keys.

For now, public-private key pairs are secure because classical computers cannot quickly find the link between the keys in any feasible timespan. Quantum computers, however, will be able to do so in seconds, which puts classical public-key encryption in grave danger.

Most Common Data Encryption Technologies

There are numerous data encryption technologies to choose from, depending on the use case, but the ones most frequently used are:

Triple DES

Triple DES (3DES) runs the DES algorithm, an outdated standard, three times. As it does this, it increases the DES key size of 56-bits to 168-bits, so it’s more difficult to compromise. That said, it does consume significant system resources.


RSA (Rivest–Shamir–Adleman), one of the first public-key algorithms, is named after three computer scientists who invented it to encrypt data in transit in the 70s. RSA uses one-way asymmetric encryption. It’s popular as it has a long key length and can be used by browsers to create secure connections over non-secure networks.

Elliptic Curve Cryptography (ECC)

ECC was developed as a follow-on improvement to RSA and is used by agencies such as the NSA. Its key lengths are shorter, and it provides better security. ECC is a powerful, fast form of asymmetric data encryption used as part of the SSL/TLS protocol.

The Advanced Encryption Standard (AES)

AES was established as the US Government standard for data encryption built for easy implementation in both hardware and software. It’s a symmetric-key algorithm and uses block cipher methods.

In Transit Versus at Rest Encryption

It’s essential that sensitive data remains encrypted at all times, but how you do this will depend on its state. Data exists in two primary states: in transit or at rest.

Let’s explore these two types of data states in more detail and how to go about encrypting them:

Data Encryption in Transit

Data is considered to be in transit if it’s moving between devices such as within a private company network or over the Internet. While data is being transferred, it’s more susceptible to being interfered with. Encrypting data during transfer, referred to as end-to-end encryption, ensures that even if the data is intercepted, its privacy is protected.

Data Encryption at Rest

Data is considered to be in a state of rest when it’s residing on a server or storage device and isn’t being used or transmitted. Data at rest is generally less susceptible to compromise than it is when it’s in transit. That’s because it’s typically protected by security protocols and infrastructure. But there are exceptions. Data at rest often contains more valuable information, which makes it an attractive target for cybercriminals. By encrypting data at rest, you can minimize the risk of a data breach or compromise caused by inadvertent password sharing or the loss or theft of mobile devices.

Data Encryption Solutions

If you’re looking to strengthen your data protection measures, you’ll want to consider enterprise-grade data encryption software. At Quantropi, we believe the best data encryption solutions must have the following features and capabilities:

Effortless Integration

The right data encryption solution should integrate seamlessly into your existing infrastructure. If initial deployment is a chore, you probably won’t have a good time using and adapting the software to your needs over the long term.


Not only should your data encryption solution be easy to deploy, but it should also be highly scalable. Scalability will simplify the extension of encryption to new devices and forms of data as your business expands. Good scalability can serve as the enabler of stable and secure business growth.

Cross-Platform Compatibility

Your data encryption software should be able to encrypt data across a wide range of platforms and operating systems. It should support platforms such as Linux, Microsoft Windows, Android, and iOS. Your encryption solution should also be compatible with the hardware and software tools you use in your workflows.

Protection at Rest and in Transit

Most solutions that are worth your attention can encrypt data both at rest and in transit, whether it’s in a data center or being transmitted over the internet. You shouldn’t settle for anything else if you want comprehensive protection.


Last but not least, your data encryption software should facilitate compliance with relevant regulations. Among other things, you should be able to monitor and enforce compliance at the workplace. Additionally, your data encryption solution should provide you with proof of encryption, which will help you show compliance in the event of an audit.

Quantropi – the Future of Quantum-grade Data Encryption

Steal now and crack later is real. Bad actors are harvesting encrypted data today to decrypt later with quantum computers. And in the not-too-distant future, these same quantum computers will break existing cryptographic defences. Enter Quantropi.

Quantropi offers the only end-to-end platform with all 3 prerequisites for cryptographic integrity: Trust, Uncertainty, and Entropy (we call it TrUE). The company’s patented “TrUE” technologies establish Trust between any two parties via quantum-secure asymmetric MASQ™ encryption; provide Uncertainty to attackers, rendering data uninterpretable forever, with QEEP™ symmetric encryption; and Entropy as a Service (EaaS) with SEQUR™— ultra-random key generation & distribution that enable secure data communications. All TrUE technologies are accessible via the company’s flagship QiSpace™ platform.

Contact us to learn more about Quantropi’s suite of capabilities – designed for today’s threats and tomorrow’s quantum attacks.

Quantum-secure any application, product, network, or device with the QiSpace™ platform — without having to sacrifice performance or make major investments in new technology or infrastructure. See for yourself how only QiSpace™ offers TrUE quantum security via all three essential cryptographic functions. Leverage asymmetric encryption algorithms (the “Trust” or “Tr” of “TrUE”) via MASQ™, symmetric encryption (“U” for “Uncertainty”) via QEEP™ and strong random numbers (“E” for “Entropy”) via SEQUR™.  Make it TrUE with QiSpace™ — and protect your business, brand, and customer promise. Now and forever. 

To learn more about our quantum-secure solutions, don’t hesitate to get in touch with our experts!

Sacha Gera

Sacha Gera possesses a deep understanding of the industry’s nuances through extensive experience in the cybersecurity sector. The Ottawa-based leader and Forty Under 40 recipient has nearly twenty years of experience in SaaS industries, professional services, and M&A, working in technology for both start-ups and large multinational organizations, such as IBM, Nortel, CGI and Calian. He currently also holds the position of CEO at JSI and Director at CENGN & Ottawa Board of Trade BOD.

Christopher McKenzie

With his extensive experience in software development and strong analytical skills, Chris can handle the entire end-to-end software development life cycle. Prior to Quantropi, he served as Director of Product Development at Sphyrna Security, Inc., where he managed the delivery of security compliance automation and data diode appliance products, and as Commercial Software Development Manager at Cord3, Inc., where he managed the development of an advanced data access policy management product. Chris graduated from Computer Science at Algonquin College and the Ottawa School of Arts in 1998. Read less

Dr. Randy Kuang

Randy holds a doctorate in quantum physics. His research findings have been published in top international journals and named “Kuang’s semi-classical formalism” by NASA in 2012. With a career spanning IT, including with Nortel as senior network researcher & developer, he co-founded inBay Technologies in 2009, serving as CTO of the cybersecurity platform. As the first recipient of a patent for two-level authentication (2011), Randy is a prolific inventor, with 30+ U.S. patents in broad technology fields, such as WiMAX, optical networks, multi-factor identity authentication, transaction authorization, as well as concepts, technologies and industrial applications for quantum key distribution.

Cory Michalyshyn

Cory brings a breadth of experience to the Quantropi team, working fractionally with multiple SaaS technology companies as CFO, and as the CFO with Celtic House Venture Partners. Prior to these roles, Cory was CFO and COO at Solink, and played a lead role in the metrics-led pivot to a direct-sales SaaS model, followed by multiple VC-backed funding rounds and their recognition as one of the fastest growing start-ups in Canada. He qualified as a CPA while serving technology, VC & PE-fund clients at Deloitte, and earned his Bachelor of Commerce at Queen’s University.

Ken Dobell

Ken leads marketing strategy at Quantropi. In high demand as a consultant with 25 years’ experience in performance media and an award- winning creative background, he has completed successful transformations, (re)branding and product development mandates with KPMG, Keurig DrPepper, Fidelity,the Previan Group of companies, Coveo, and numerous others. Previously, Ken pivoted an offline advertising brokerage to a leading-edge, data-driven performance agency as President of DAC Digital, held a progression of international leadership roles with Monster.com in North America and Europe, pioneered a range of multi-channel initiatives as VP Marketing with a global franchisor, and introduced a mobile-first programmatic media offering to Canada within WPP.

Raj Narula, P.Eng.

A seasoned technology executive, business builder and angel investor, Raj has held operational and advisory roles in Recognia (Trading Central), Belair Networks (Ericsson), March Networks (Infinova), Sandvine (Procera), Neurolanguage (ADEC), Bridgewater Systems (Amdocs), Vayyoo (Cafex), TenXc (CCI), 1Mobility (Qualys) and others. Having divided his time among North America, EMEA and Asia-Pac for over 20 years, Raj speaks several languages. He grew up in Asia, Europe, South America and Canada, and holds a B.Eng degree in Mechanical Engineering from the University of Ottawa. He is also a co-founder and Charter Member of the Ottawa chapter of TiE (the Indus Entrepreneur).

Michael Redding

Before joining Quantropi, Mike was Managing Director and co-founder of Accenture Ventures, where he grew a global portfolio of strategic partnerships and 38 equity investments in emerging technology startups.

During his nearly 30 years with Accenture, he incubated and launched technology innovations for enterprises across multiple geographies and industries. Ever-passionate about bold ideas with game-changing results, he speaks frequently on the impact of emerging technology on large organizations.

With a bachelor’s degree in Electrical Engineering and Computer Science from Princeton, and a Master’s in Biomedical Engineering from Northwestern, Mike is a former member of the Board of Directors for the Accenture Foundation and Board Observer for startups Maana and Splice Machine.

Alex He

Alex is a product-oriented project manager who bridges the gaps between the company’s engineering and commercial teams. He has over ten years of experience in the analysis, design and development of enterprise-class applications, with a particular focus on creating optimal user experiences (UX). Ever passionate about cybersecurity solutions that can deliver solid security without unreasonably sacrificing customer convenience, Alex is the lead inventor of a registered patent on user interface security. He is committed to helping ensure that the Agile software engineering team at Quantropi delivers consistently high-quality, high crypto-agility cybersecurity solutions for next-generation communications.

Nick Kuang

As VP Corporate Services, Nick plans, directs and coordinates a wide range of activities aimed at achieving Quantropi’s vision of the Quantum Internet. He has a keen interest in transformative technologies and the possibilities they offer for bettering our everyday lives. A pharmacist by training, Nick nurtures teams with a focus on integrity and collaborative effort, coupled with strong attention to detail. With prior experience in a successful biotech start-up developing point-of-care test kits, he enjoys the fast pace and challenge of the start-up environment.

Tina Wang

Tina develops websites and participates in a range of different projects, using new frameworks for front-end UI, along with Vuejs, Angula, Beego, Ruby on Rails, and Electron. She developed Quantropi’s desktop CipherSpace application by integrating Electron, Webassembly and Go, to ensure a good user experience, as well as perfect operating system compatibility. She is also part of the dynamic and efficient QKD-NODE project team. Tina is always looking for new ways to increase her knowledge, improve her technological proficiency and enhance her strong execution and implementation skills. Prior to Quantropi, Tina served as a full-stack web developer at Sunny Future, where she maintained a WordPress home site and managed the release of new content for the company.

Bond Vo

Bond Vo is the Business Analyst of Quantropi. Along with Quantropi, Bond has been dynamic in accordance with a fast and evolving startup environment and is responsible in a wide range of areas including market research, funding, and more involved in the controller roles to oversee day to day accounting operation as well as build financing models and budget to achieve company’s ultimate goals/objectives. Bond has applied best practices consistently and successfully supports equity, debt, and non-dilutive funding for Quantropi since joint the team. He earned a Bachelor of Commerce concentrated in Finance from Carleton University. Outside of his professional career, Bond also participated in volunteer for the Vietnamese Immigration Student Association (VISA) to help and support students as well as newcomers in Canada.

Pauline Arnold

As James Nguyen’s EA, Pauline Arnold brings more than 40 years of experience in complementary customer service and administrative roles. Prior to Quantropi, she served 20 years as Branch Manager and an assistant in investments, and over 20 years at Metropolitan Life Canada in various aspects of the insurance sector – assisting clients, management and colleagues to complete tasks, solve problems, address questions and achieve goals. She also worked part-time for Royal Lepage Performance for 5+ years as a receptionist & admin, and for 5 years was chair of the TKFG’s charity golf tournament.

Dafu Lou

Dafu is Quantropi’s Director of engineering. Prior to Quantropi, he served as a technical leader at Irdeto, a world-leading provider of digital platform security software, where he was responsible for white-box cryptography, cloaked CA secure core, and iOS/android application protection services, among others. Prior to Irdeto, Dafu served as a senior software engineer at SecureNex Systems, where he led the implementation of an SSL-VPN solution and ECC-based secure data storage & PKI. He earned his Ph.D. in electrical engineering from the University of Ottawa in 2009. Dafu is also a part-time professor, teaching VLSI, Cryptography and other subjects at uOttawa.

Eric Chan

Eric Chan a.k.a. EEPMON is a Crypto / Digital Artist with 15 years in the industry – and Quantropi’s Creative Emissary. His hybrid fractal/digital creations have been seen in fashion, comics to museums and has exhibited worldwide. EEPMON’s collaborations include Canada Goose, MARVEL, Snoopy, Microsoft Xbox, Canada Science & Technology Museum and was a TEDx performing artist. In 2018 he represented Canada on its first Creative Industries Trade Mission led by Canada’s Minister of Heritage and serves on the Canadian Museums Association‘s Board of Directors. At the same time, he is currently completing his Master of Information Technology – Digital Media at Carleton University. 

Jeff York

Jeff’s distinguished career includes an extraordinary track record of successfully navigating and spearheading expansions and transforming companies into industry giants. Jeff was the President and CEO of Giant Tiger Stores for 10 years. In this capacity, Jeff helped grow the business from a regional discount chain with 250 million in sales to 1.4 billion in sales nationally as Canada’s third largest discount chain. In 2009, Jeff joined Farm Boy with a mandate to expand the business. Under his leadership, the company grew from a nine-store chain in the Ottawa region to 26 stores in Ottawa, Kingston, the GTA and Southwestern Ontario. Farm Boy was acquired by Sobeys’ parent company Empire Company Limited for $800 million in 2018.

Patricio Mariaca

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum quis mauris justo. Vestibulum vel nulla vel tortor dignissim auctor. Donec porta semper lacus, id mollis metus pretium at. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Nam malesuada ullamcorper metus, eget facilisis tortor posuere sed.

Talk To Us

Marco Pagani

Marco Pagani began his long and successful career as a senior executive in Ottawa’s high-tech sector in 1985, with Nortel Networks (then Bell-Northern Research). He rose across two decades to become president of several Nortel Business Units, managing more than 2,000 employees and over $1 billion in revenue. Having gone on to advise numerous organizations, as well as guide a range of companies through complex, critically necessary turnarounds, he is particularly respected for placing a strong emphasis on ethics and corporate governance in building the culture of the corporate and not-for-profit organizations he leads and supports.

Lawrence O’Brien

Lawrence O’Brien is a founder of Calian Group and former Mayor of Ottawa. Larry founded Calian Technology Ltd. in 1982 with a $35 investment and built it into a $200M/ year profitable, dividend-paying public company by 2006. As the CEO of Calian, Larry executed an IPO in 1993, completed five significant acquisitions, and managed the overall strategic growth of Calian from 1982 until 2006. After retirement from Calian in 2006, Larry served as the 58th mayor of Ottawa and proceeded to push forward four major economic development projects, including a Light Rail Transit tunnel in the core of the city, a new Convention Centre, now known as the Shaw Centre and a new trade show facility and a major urban renewal project that rebuilt 40 acres of dilapidated downtown Ottawa called Lansdowne Park into a vibrant, destination for citizens and tourist.

Dat Nguyen

Dat Nguyen has executive experience with top global consultancies such as IBM, Accenture, Ernst & Young (EY), and decacorn start-up Grab at C-Level roles.

During 20 years of consulting, Dat has worked with multiple companies across Canada, the USA, the Caribbean, and the Asia Pacific with CEO roles and leadership such as CEO for Accenture Vietnam, CEO of Grab Vietnam, and Partner of EY Consulting leading the technology practice (including Cybersecurity) in Indochina (Vietnam, Laos, Cambodia).

Dat is a tech entrepreneur, a co-founder, and a digital ecosystem builder. He is passionate about new and innovative technologies and is involved in multiple companies across verticals such as AI, Blockchain, Web3, Cybersecurity, InsurTech, and FinTech. Dat is currently a member of the ASIA CEO Club.

Dat earned the Executive Education at Harvard University, John F. Kennedy School, and received the Executive Certificate in Public Leadership in 2018.

Tanya Woods

Tanya Woods brings more than a decade of successful strategic advocacy experience to her role at the Chamber of Digital Commerce Canada. Tanya most recently served as the Interim Executive Director for the Blockchain Association of Canada and is a champion for Canada’s digital innovation ecosystem, domestically and globally. Tanya has held senior-level positions in the industry, representing national and multinational organizations in the telecommunications, technology, and entertainment sectors, including BCE Inc., Microsoft, Hut 8 Mining, and Nintendo. She has also advised and represented the Government of Canada in global trade negotiations and on the growth of the country’s blockchain ecosystem. Tanya is a global public speaker and published author with degrees from the London School of Economics, Ottawa University, and American University Washington College of Law. She was named among the top 10 “Leading TechWomen in Canada” by the Government of Canada, a “Trailblazer” by the Canadian Broadcasting Corporation, and a “Top 40 under 40” in Canada’s Capital by the Ottawa Chamber of Commerce and the Ottawa Business Journal.

Renato Pontello

Renato has 30 + years of experience as a trusted legal advisor and strategist. As an executive he has assisted numerous companies and their Boards of Directors to plot out and implement significant growth, diversification and reorganization plans in challenging circumstances. He was lead counsel on the sale of Zarlink Semiconductor’s $680 million dollar business as part of a takeover bid. At Zarlink he negotiated significant development, manufacturing, supply, distribution and IP licensing agreements with leading suppliers (eg Cisco, Nokia, Ericsson, Medtronic, Starkey, TSMC, Global Foundries, etc.). Renato has been involved in M&A, restructuring, financings and commercial contracts for dozens of companies. He also provides legal support in regards to intellectual property, securities, real estate leasing and employment law. He represents clients mostly in the SaaS, wireless, proptech, quantum, renewables, e-commerce, engineering and real estate conversion space.

Timothy Stapko

Timothy Stapko is a senior software engineer at Microsoft with 20+ years of experience in the information technology industry specializing in embedded systems, IoT security, security (SSL/TLS), and 9+ years of experience leading projects and a team of engineers on two commercially successful implementations of TLS for resource-constrained embedded systems (including cryptography, X.509, DTLS, HTTPS, etc.). Tim also has experience with US federal information standards (e.g., FIPS) and other standards and certifications (e.g., Common Criteria/EAL) and specializes in C, C++, FIPS 140-2, Linux, SSL, TLS, TCP/IP

Jay Toth

Prior to joining Quantropi, Jay was Chief Growth Officer of Kepro, responsible for the organization’s overall growth strategy in government markets. Before that, Jay held a progression of sales leadership and general management roles during his nearly 17 years at Microsoft, including GM, Enterprise Services, State and Local Government & Education, during which period he was responsible for the most complex business in the U.S. subsidiary (with 2,000 customers across the country), nearly doubling revenue from $160M to over $300M. Prior to his career at Microsoft, Jay was VP at Risetime, where he launched and ran a Financial Services practice area; a Principal at Lakefront, where he was responsible for business development and strategic partnerships; and a Manager at Accenture in the Emerging Technology Solutions group. He holds a Bachelor of Science in Mechanical Engineering from the University of Virginia.

Nik Mahidhara

Prior to joining Quantropi, Nik most recently provided strategic and tactical leadership as Director of Finance overseeing a large corporate treasury department. Here, he managed over $2B in operating funds and $1B in financing. Other responsibilities included cash management and forecasting, liquidity and investments, corporate financing, financial risk management as well as accounting and internal control management. Preceding that, Nik provided assurance, accounting and advisory services focused on high tech clients with PricewaterhouseCoopers (PwC) Canada. Nik has held progressive finance roles in various different environments and holds a Chartered Professional Accountant (CPA) designation and an MBA from the Schulich School of Business.

Brian LaMacchia

Brian LaMacchia recently retired from Microsoft Corporation where he was a Distinguished Engineer and head of the Security and Cryptography team within Microsoft Research. He is an Adjunct Associate Professor in the Luddy School of Informatics, Computing, and Engineering at Indiana University Bloomington, an Affiliate Faculty member of the Paul G. Allen School of Computer Science and Engineering at the University of Washington. Brian also currently serves as Treasurer of the International Association for Cryptologic Research (IACR) and as a Vice President of the Board of Directors of Seattle Opera. Brian received S.B., S.M., and Ph.D. degrees in Electrical Engineering and Computer Science from MIT in 1990, 1991, and 1996, respectively.

James Nguyen

James Nguyen is a Co-Founder and the CEO of Quantropi, a quantum-secure communications company established in 2018. Alongside Dr. Randy Kuang, he aims to uphold truth and trust in the digital economy on a global scale. In 2021, James was officially recognized as a recipient of Ottawa’s Top Forty Under 40 Award, and he holds a degree in Economics from Carleton University.

With a profound understanding of banking and global finance, James actively invests in and advises early-stage companies in the fields of Fintech, Graphene, and Quantum Technologies, particularly in emerging markets. Prior to his role at Quantropi, he served as the Chief Investment Officer and VP of Asia Operations for a diverse group of private and public interests involved in real estate, mining, energy storage, and manufacturing. In this capacity, he was responsible for strategy, banking, and global expansions, successfully securing substantial investments and partnerships to commercialize graphene applications across various industries.

James participates as a speaker and panelist at international conferences focused on quantum technology, cybersecurity, and investment. He also contributes to the community as a volunteer and mentor, leveraging his expertise and experiences to benefit others.