Insights on Cryptography, Quantum Readiness, and Security Strategy
Analysis, research, and practical guidance on cryptographic posture management, post-quantum security, and emerging risks shaping modern security programs.
Tags:
NIST Round Two: One Step Closer to Standardization
Best practices for cryptography evolve with time, and staying secure sometimes requires immediate reaction. The transition to Elliptic Curve Cryptography specified by the US National Security Agency's 2005 "Suite B" recommendation included a comfortable transition period. However, in August 2015, the…
Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready
Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future arrival already puts many aspects of information security at risk today because of “harvest-and-decrypt”…
We’re on a mission to create a quantum-safe world
On November 19th, we announced the exciting news that we raised $10 million USD in Series A funding led by Shasta Ventures. This is in addition to an initial capital investment of $11.5 million USD from Quantum Valley Investments. Subsequently, I’d like to officially welcome Nitin Chopra, Partner at…
The PKI Guy talks quantum-safe security with Alexander Truskovsky
Our Senior Product Manager, Alexander Truskovsky, sat down with Mark B. Cooper of PKI Solutions Inc (A.K.A The PKI Guy) to discuss quantum-safe security, which was released August 1st, 2018.
Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny-based cryptography offers the closest quantum-safe cryptographic primitives…
From Research to Action
Understanding cryptographic risk is only the first step. Organizations use these resources to inform cryptographic discovery, posture assessment, remediation planning, and quantum-safe migration strategies aligned with real-world constraints.
Every Environment Is Different
If your cryptographic exposure isn't fully clear, a short working session can help pinpoint priorities and outline practical next steps.