Blog

Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future arrival already puts many aspects of information security at risk today because of “harvest-and-decrypt” attacks, for example, where adversaries collect and store encrypted data with the intention of decrypting it in the future.

Now, business leaders recognize that they need to start preparing and are asking how they can become ‘quantum-ready.’

For security leaders, protecting your organization’s critical assets, products and confidential data using a quantum-safe method is essential. We will discuss two such approaches: quantum-safe cryptography and quantum key distribution.

Continue Reading

Scott Totzke, CEO & Co-founder of ISARA, talks about what our recent Series A investment announcement means for the future of ISARA and quantum-safe security.

Continue Reading

Our Senior Product Manager, Alexander Truskovsky, sat down with Mark B. Cooper of PKI Solutions Inc (A.K.A The PKI Guy) to discuss quantum-safe security, which was released August 1st, 2018. This conversation covers: quantum computing’s threat to public key cryptography quantum-enabled “harvest and decrypt” attacks the importance of having crypto-agile certificates in the quantum era […]

Continue Reading

One of the most widely deployed public key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny based cryptography offers the closest quantum-safe cryptographic primitives to ECDH.

Continue Reading

With increased investments in quantum technology by nation states such as China and Russia, the heat is on for the United States to start taking quantum seriously. Several bills have been proposed to fund quantum research and development in the private sector and academia. Winning the quantum race will require collaboration between allied nations, academia and the private sector.

Continue Reading

While the ideal of public key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one cryptographic algorithm with a fixed set of parameters that will last indefinitely. As computers become more powerful and new attacks are found on existing protocols, it is important to update our cryptography. This can involve increasing parameters on widely used algorithms. There have also been times when it involved switching to new cryptographic schemes entirely. With the onset of large-scale quantum computing, we are currently at the start of the second major migration of public key cryptography, part of the constantly evolving progression of cryptography.

Continue Reading

The following is an excerpt from a contributed opinion piece on Journal of Cyber Policy by Scott Totzke, CEO & Co-founder of ISARA Corporation.

The dawn of the quantum computing era promises to fundamentally change the way we approach big problems – from researching cures for cancer to alleviating traffic in urban centers. But – and this is a very significant but –  large-scale quantum computing also has the potential to create catastrophic problems if we don’t take steps now to ensure that data such as financial transactions, medical histories and government records are protected with quantum-safe encryption.

Continue Reading

On April 24, ISARA Corporation’s VP of Business Development, Paul Lucier, was invited to join The Peggy Smedley Show – one of the most influential, Internet of Things (IoT) podcasts discussing relevant tech trends – with Peggy Smedley. In this interview, now available as a podcast, they discussed both positive disruption and dark side of […]

Continue Reading

Earlier this month at the ITU-T Headquarters in Geneva, Matthew Dalais of ITU interviewed Mark Pecen, Chief Executive Officer, and Alexander Truskovsky, Senior Product Manager, about quantum-safe X.509 digital certificates and the most recent revision of this key standard in the public key infrastructure. Mark Pecen provides a brief introduction to quantum computing and its [...]

Continue Reading

Crypto-agility is the key to cost-effectively migrate information and communication technology (ICT) systems from legacy to quantum-safe systems. By using our unique dual algorithm approach to certificates, this is possible for large organizations and governments.

Continue Reading