ISARA Insights Blog


Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more


Why are Washington lawmakers suddenly so interested in quantum tech?

Paul Lucier
Jun 28, 2018

Blockchain. Artificial intelligence. Machine learning. These have all become buzzwords in Washington as lawmakers hear about how these promising technologies are expected to benefit the American public…

Read more


A Short History of Public Key Cryptography

Victoria de Quehen
Jun 14, 2018

While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one…

Read more


Transforming PKI Migrations: Unlocking the Power of Crypto-Agility with Quantum-Safe Multiple Algorithm Certificates

Alex Truskovsky
Apr 12, 2018

Crypto-agility is the key to cost-effectively migrate information and communication technology (ICT) systems from legacy to quantum-safe systems. By using our unique dual algorithm approach to certificates,…

Read more


ISARA Radiate™ Security Solution Suite 1.4 Brings XMSS to Complete its Offering of Stateful Hash-Based Signatures for Quantum-Safe Roots of Trust

Alex Truskovsky
Mar 27, 2018

With the latest release of the ISARA Radiate™ Security Solution Suite, we’ve added stateful hash-based signatures, specifically eXtended Merkle Signature Scheme (XMSS), to the cryptographic library. With…

Read more