ISARA Insights Blog

Featured Blog Post

Quantum Computing Urgency and Timeline

Atsushi Yamada
Apr 22, 2022

What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as far as migration and transition planning and deployment — and companies need to start readying their systems, infrastructures, and applications now to manage security risks and maintain high performance throughout the transition. I recently presented at the Sectigo Summit 2022 to share insights on what’s needed during this process and why the management of cryptography that enterprises use and crypto agility are important.

Read more


Quantum Computing Urgency and Timeline

Atsushi Yamada
Apr 22, 2022

What is the quantum computing urgency, the latest post-quantum cryptography (PQC) timeline, and why should organizations prioritize this? The shift to quantum computing is going to be a massive one — as…

Read more


Lattice-Based Cryptography

Victoria de Quehen
Sep 21, 2021

Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography…

Read more


Math Paths to Quantum-safe Security: Hash-based Cryptography

Victoria de Quehen
Feb 24, 2020

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…

Read more


Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more


A Short History of Public Key Cryptography

Victoria de Quehen
Jun 14, 2018

While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one…

Read more