ISARA Radiate

QUANTUM-SAFE SECURITY SOLUTION SUITE

QUANTUM-SAFE: THE NEXT GENERATION OF CYBERSECURITY

The ISARA Radiate™ Security Solution Suite is the first complete security solution to offer a high-quality implementation of academic & industry recognized quantum-safe algorithms and integration tools built for developers.

The foundation of ISARA Radiate™ is a set of quantum-safe algorithms ready for use in current security protocols and products.

SECURITY SYSTEMS & PROTOCOLS

All of the ISARA Radiate™ algorithms have been speed-optimized while providing the highest levels of security and performance (oftentimes faster than current security systems).

This means you don’t need to choose between quantum-safe security and user experience.

DIGITAL SIGNATURE

Quantum-safe authentication is possible using the Dilithium, Rainbow, XMSS and LMS schemes.

KEY ENCAPSULATION

Securely transport symmetric keys using Kyber, NTRUPrime and QC-MDPC McEliece quantum-safe algorithms.

KEY AGREEMENT

Quantum-safe key agreement is possible using SIDH, NewHope, and LUKE. Use as a straight drop-in replacement or alongside our ECDH (FIPS 140-2 certification in progress).

The ISARA Radiate™ cryptographic library provides full coverage across all five areas of math suitable for quantum-safe algorithm development and allows for full public key cryptography functionality.

ISARA Radiate quantum-safe post-quantum cryptographic library

INTEGRATION TOOLS & OPENSSL, CHECK!

We provide you with the cryptographic building blocks needed to seamlessly migrate your products to a quantum-safe state. Included are supporting cryptographic primitives and a quantum-safe OpenSSL integration tool to facilitate a seamless integration.

LIGHTWEIGHT & PACKS A PUNCH

Delivered through a highly-optimized, lightweight C library, it’s perfect for constrained environments such as vehicles, mobile and IoT devices.

FIPS 140-2 CERTIFICATION

We understand the strict needs of government. The classic algorithmic portion of the cryptographic module is currently undergoing FIPS 140-2 certification, to facilitate easy deployment of hybrid key agreement schemes today.

(Implementation under test as of 2017-07-07.)

SPEED-OPTIMIZED ‘NEW HOPE’

LUKE (Lattice-based Unique Key Exchange), is an ISARA speed-optimized version of the NewHope algorithm. In benchmarking tests, LUKE is 30% faster than New Hope.

LMS & XMSS: IDEAL FOR ROOTS OF TRUST

Leighton-Micali Signature (LMS) scheme and Extended Hash-Based Signature Scheme (XMSS) are two algorithms that stand out from the rest of quantum-safe candidates.  They are based on a mature area of mathematics and are well trusted to be used today.  They are not part of the NIST’s selection process and will be approved for certain type of use cases, like code-signing.  While they generally perform better than elliptic curve cryptography (ECC), they have one drawback – a large stateful private key.  We’ve solved the state management problem in our HSM implementation, making these schemes ready for quantum-safe roots of trust in code and certificate signing today.

SHOULD I WAIT FOR STANDARDS?

Quantum-safe standards development is underway, and we’re committed to leading and collaborating on them.

However, the time to plan, test and implement is shrinking and setting global standards will take several years, making confidential information vulnerable to harvest & decrypt attacks. Fortunately, ISARA’s hybrid security solutions are recognized as a secure option to mitigate against harvest & decrypt attacks and are available today.

The ISARA Radiate™ Security Solution Suite provides coverage across all five areas of math recognized by academia & industry as suitable for quantum-safe algorithm development. The Suite gives you multiple options for each type of public key cryptography. When NIST selects a suite of quantum-safe algorithms, you’re covered.

  • Lattice-based
  • Hash-based
  • Code-based
  • Multivariate-based
  • Supersingular Isogeny-based

LET’S START YOUR QUANTUM-SAFE MIGRATION TODAY.

ARE YOU A DEVELOPER?

We’ve created these materials just for you.

  • Hash algorithms: BLAKE2b (256-bit and 512-bit), SHA2 (Secure Hash Algorithm 2; 256-bit and 512-bit), SHA3 (Secure Hash Algorithm 3; 256-bit and 512-bit)
  • Message authentication codes: HMAC (Hash based Message Authentication Code), Poly1305
  • Random number generators: HMAC-DRBG (HMAC Deterministic Random Bit Generator), SHAKE (128-bit and 256-bit)
  • Key derivation functions: RFC-5869, NIST SP 800-56A Alternative 1 Concatenation, PBKDF2 (Password Based Key Derivation Function 2)
  • Digital signature schemes: Dilithium, LMS (Leighton-Micali Signature), XMSS, Rainbow
  • Key agreement schemes: ECDH (supporting NIST P256, P384, P521, and Curve25519), LUKE (Lattice based Unique Key Establishment), NewHope, SIDH (Supersingular Isogeny Diffie-Hellman)
  • Key encapsulation mechanisms: Kyber, McEliece QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check), NTRUPrime
  • Symmetric cipher: ChaCha20

Recommended:

  • Android 7.0 (Nougat) or newer (API level 24 or higher)
  • iOS 10 or newer
  • Linux (Ubuntu 16.04 LTS or newer, Debian 9.1 or newer; 64-bit platforms)
  • macOS 10.11 or newer
  • Windows 10 (64-bit platforms)

Minimum:

  • Android 5.0 (Lollipop) or newer (API level 21 or higher)
  • iOS 8.1 or newer
  • Linux (Ubuntu 14.04 LTS or newer, Debian 8 or newer)
  • macOS 10.10 or newer
  • Windows 7 or newer

Supported Architectures by OS:

  • Android: x86, x86_64, armabi, armabi-v7a, arm64-v8a
  • iOS: x86, x86_64, armv7, armv7s, arm64
  • Linux: x86_64, core2, sandybridge, skylake
  • macOS: x86_64, core2, sandybridge, skylake
  • Windows: x86_64, core2, sandybridge, skylake

Additional architecture-specific builds can also be created on demand; please contact ISARA’s sales team.

THE QUANTUM THREAT EXPLAINED, NO PH. D REQUIRED