Philip Lafrance
Feb 08, 2021
What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography?…
Philip Lafrance
Jan 25, 2021
Will your organization survive the crypto-pocalypse? “The power of quantum computing brings the day closer when the conventional encryption we all rely on can no longer protect us,” warns Roger A. Grimes,…
Paul Lucier
Jul 30, 2020
On July 22nd National Institute of Standards and Technology (NIST) announced that they have entered the ‘selection’ round in the process of standardizing post-quantum cryptography. If you’re reading this,…
Philip Lafrance
Apr 29, 2020
This month the RAND corporation released a new report investigating the quantum threat. The authors consider three key timelines in the coming paradigm shift to quantum-safe cryptography. They investigated…
Victoria de Quehen
Jul 27, 2018
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…