ISARA Insights Blog
Tags:
Math Paths to Quantum-safe Security: Hash-based Cryptography
Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature algorithms will be vulnerable to quantum-enabled attacks. Hash-based cryptography is among the oldest…
Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat
The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI and effects the way Elliptic Curve Cryptography (ECC) x.509 certificates are validated, giving…
Take the First Steps To Quantum-Safe Security Now to Avoid Mistakes Later
The following is an excerpt from a contributed opinion piece on Next Gov by Scott Totzke, CEO & Co-founder of ISARA Corporation. No enterprise—whether a government, a military or a private company—can afford to be unprepared.
Quantum-Safe Cryptography: The Time to Prepare Is Now
The following is an excerpt from a contributed opinion piece on DARK Reading by Scott Totzke, CEO & Co-founder of ISARA Corporation. Quantum computing is real and it's evolving fast. Is the security industry up to the challenge?
Myth-Busting the Quantum Threat: The Top 3 Misconceptions About Quantum-Safe Migrations
Part of our mission at ISARA is to educate and raise awareness of the security risks introduced by large-scale quantum computing. Since I joined ISARA in 2016, I’ve spoken to individuals, enterprises, and governments around the world, and along the way, I’ve heard some incorrect assumptions about the…