Featured Blog Post
Feb 08, 2021
What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography? With enterprises planning the migration of their entire cryptographic assets from classical public-key cryptography to quantum-safe cryptography, they can improve their infrastructure wellness now by taking preventative steps with crypto-agile solutions. Think of crypto-agility as the “super food” for cryptographic wellness.
Victoria de Quehen
Jul 27, 2018
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…