ISARA Insights Blog
Tags:
Math Paths to Quantum-safe Security: Hash-based Cryptography
Victoria de Quehen
Feb 24, 2020
Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…
Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat
Mike Brown
Jan 17, 2020
The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI…
Take the First Steps To Quantum-Safe Security Now to Avoid Mistakes Later
Scott Totzke
Nov 12, 2019
The following is an excerpt from a contributed opinion piece on Next Gov by Scott Totzke, CEO & Co-founder of ISARA Corporation. No enterprise—whether a government, a military or a private company—can…
Quantum-Safe Cryptography: The Time to Prepare Is Now
Scott Totzke
Oct 02, 2019
The following is an excerpt from a contributed opinion piece on DARK Reading by Scott Totzke, CEO & Co-founder of ISARA Corporation. Quantum computing is real and it's evolving fast. Is the security industry…
Myth-Busting the Quantum Threat: The Top 3 Misconceptions About Quantum-Safe Migrations
Paul Lucier
Jul 23, 2019
Part of our mission at ISARA is to educate and raise awareness of the security risks introduced by large-scale quantum computing. Since I joined ISARA in 2016, I’ve spoken to individuals, enterprises,…