Blog

Our team at ISARA was recently awarded further funds for our research and development of quantum-safe cryptography and agile technologies. In this blog post, Mike Brown shares how this funding will support ISARA’s corporate goals.

Continue Reading

Quantum technologies are poised to benefit our world for the better (and in some ways for worse), but in what specific ways? Martin Laforest explores 5 ways quantum computing will change our world.

Continue Reading

On March 7, ISARA Corporation’s Chief Technology Officer & Co-Founder, Mike Brown, was invited to join The Georgian Impact Podcast hosted by Jon Prial. This podcast allows entrepreneurs to recognize opportunities and threats that they are facing in the technology industry.

Continue Reading

Jacquelyn Parker, ISARA’s Vice President of Operations, has always carved out her own path, both professionally and personally. Learn more about her career in STEM in celebration of International Women’s Day 2019.

Continue Reading

Best practices for cryptography evolve with time and staying secure sometimes requires immediate reaction. The transition to Elliptic Curve Cryptography specified by the US National Security Agency’s 2005 “Suite B” recommendation included a comfortable transition period. However, in August 2015 the NSA unexpectedly publicized a report recommending that any institutions which had still not completed the transition to Suite B schemes should continue using the older schemes and instead prepare for an upcoming transition to quantum-safe cryptography.

Continue Reading

Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future arrival already puts many aspects of information security at risk today because of “harvest-and-decrypt” attacks, for example, where adversaries collect and store encrypted data with the intention of decrypting it in the future.

Now, business leaders recognize that they need to start preparing and are asking how they can become ‘quantum-ready.’

For security leaders, protecting your organization’s critical assets, products and confidential data using a quantum-safe method is essential. We will discuss two such approaches: quantum-safe cryptography and quantum key distribution.

Continue Reading

Scott Totzke, CEO & Co-founder of ISARA, talks about what our recent Series A investment announcement means for the future of ISARA and quantum-safe security.

Continue Reading

Our Senior Product Manager, Alexander Truskovsky, sat down with Mark B. Cooper of PKI Solutions Inc (A.K.A The PKI Guy) to discuss quantum-safe security, which was released August 1st, 2018. This conversation covers: quantum computing’s threat to public key cryptography quantum-enabled “harvest and decrypt” attacks the importance of having crypto-agile certificates in the quantum era […]

Continue Reading

One of the most widely deployed public key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny based cryptography offers the closest quantum-safe cryptographic primitives to ECDH.

Continue Reading

With increased investments in quantum technology by nation states such as China and Russia, the heat is on for the United States to start taking quantum seriously. Several bills have been proposed to fund quantum research and development in the private sector and academia. Winning the quantum race will require collaboration between allied nations, academia and the private sector.

Continue Reading