ISARA Insights Blog
Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action
Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform…
Tags:
Lattice-Based Cryptography
Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography to highly complex protocols.
Math Paths to Quantum-safe Security: Hash-based Cryptography
Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature algorithms will be vulnerable to quantum-enabled attacks. Hash-based cryptography is among the oldest…
Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny-based cryptography offers the closest quantum-safe cryptographic primitives…
A Short History of Public Key Cryptography
While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one cryptographic algorithm with a fixed set of parameters that will last indefinitely. As computers…