Archives

One of the most widely deployed public key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny based cryptography offers the closest quantum-safe cryptographic primitives to ECDH.

Continue Reading

While the ideal of public key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one cryptographic algorithm with a fixed set of parameters that will last indefinitely. As computers become more powerful and new attacks are found on existing protocols, it is important to update our cryptography. This can involve increasing parameters on widely used algorithms. There have also been times when it involved switching to new cryptographic schemes entirely. With the onset of large-scale quantum computing, we are currently at the start of the second major migration of public key cryptography, part of the constantly evolving progression of cryptography.

Continue Reading