ISARA Radiate

QUANTUM-SAFE SECURITY SOLUTION SUITE

QUANTUM-SAFE: THE NEXT GENERATION OF CYBERSECURITY

The ISARA Radiate™ Quantum-Safe Toolkit includes a high-performance, standards-based quantum-safe cryptographic library and integration tools built for developers.

All of the ISARA Radiate algorithms have been optimized for efficiency while providing the highest levels of security and performance. This means you don’t need to choose between quantum-safe security and user experience. Plus, you can upgrade using your existing systems.

PRODUCTION-READY

Deploy several optimized and thoroughly tested quantum-safe cipher suites, all ready for production within your existing systems.

STANDARDS-BASED

Confidently begin testing today knowing that our team of experts have selected a “smart cipher list” of the most promising algorithms from the NIST Post-Quantum Cryptography Standardization process (including Diffie-Hellman variations of those algorithms) and the IETF.

EASY-TO-USE & LIGHTWEIGHT

Leverage a lightweight library, written in C and highly portable to new platforms and architectures. It’s perfect for constrained environments such as vehicles, mobile and IoT devices, and was designed to be clean, logical and consistent, making it very developer-friendly.

ISARA Radiate Cryptographic Library Version 2.0 includes the following quantum-safe algorithms:

ISARA Radiate Crypto Library quantum-safe post-quantum cryptographic algorithms.

INTEGRATION TOOLS FOR DEVELOPERS

We provide support for Java using the ISARA Radiate JNI Wrapper (available April 2019) to facilitate a seamless integration, saving you time and resources.

SUPPORT AVAILABLE

We offer a variety of different support packages to suit your specific needs. Please get in touch with our team for more details.

HSS & XMSS: IDEAL FOR ROOTS OF TRUST

Hierarchical Signature Scheme (HSS) and eXtended Merkle Signature Scheme (XMSS) are based on a mature area of mathematics and are well trusted to be used for digital signatures today. They are not part of the NIST PQC Standardization process but will be approved for specific use cases, like code-signing and certificate-signing. While they generally perform better than elliptic curve cryptography (ECC), they have one drawback: a large stateful private key. By working closely with our HSM partners, we’ve solved the state management problem making these schemes ready for quantum-safe roots of trust in code and certificate signing today.

SHOULD I WAIT FOR STANDARDS?

NIST has undertaken the process for setting quantum-safe algorithm standards and expects to complete it by 2022/2024. Learn more on NIST’s website.

However, the time to plan, test and implement agile quantum-safe security measures is shrinking. Switching out cryptographic algorithms that are used ubiquitously and deeply embedded in the software stack is not a quick or easy feat.

Fortunately, you don’t need to wait for standards to begin testing. You can confidently begin embedding quantum-safe algorithms in combination with classical algorithms using agile technologies. NIST refers to this approach as hybrid mode and recommends it as the first step in a migration to quantum-safe security.

Use ISARA Radiate in conjunction with ISARA Catalyst™ Agile Technologies to test and develop solutions that maintain current security measures, while adding post-quantum algorithms that are backward compatible. The toolkit and ISARA Catalyst give you the crypto-agility you need to protect high-value assets and confidential data before standards are set.

START YOUR QUANTUM-SAFE MIGRATION TODAY

Our team of quantum-safe security experts can help.

ARE YOU A DEVELOPER?

We’ve created these materials just for you.

  • Hash algorithms:
    • SHA2 (Secure Hash Algorithm 2; 256 bit, 384 bit and 512 bit)
    • SHA3 (Secure Hash Algorithm 3; 256 bit and 512 bit)
  • Message authentication codes:
    • HMAC (Hash-based Message Authentication Code)
    • Poly1305
  • Random number generators:
    • HMAC-DRBG (HMAC Deterministic Random Bit Generator)
  • Key derivation functions:
    • RFC-5869
    • NIST SP 800-56A Alternative 1 Concatenation
    • PBKDF2 (Password-Based Key Derivation Function 2)
  • Digital signature schemes:
    • Dilithium
    • HSS (Hierarchical Signature Scheme)
    • Rainbow
    • SPHINCS+
    • XMSS (eXtended Merkle Signature Scheme)
    • XMSSMT (multi-tree XMSS)
  • Key agreement schemes:
    • FrodoDH
    • NewHopeDH
    • SIDH (Supersingular Isogeny Diffie-Hellman)
  • Key encapsulation mechanisms:
    • Classic McEliece
    • FrodoKEM
    • Kyber
    • NTRUPrime
    • SIKE (Supersingular Isogeny Key Exchange)
  • Symmetric cipher:
    • ChaCha20 symmetric

Recommended:

  • Android 7.0 (Nougat) or newer (API level 24 or higher)
  • FreeBSD 11 or newer (64 bit platforms)
  • iOS 10 or newer
  • Linux (Ubuntu 16.04 LTS or newer, CentOS 7 or newer; 64 bit platforms)
  • macOS 10.11 or newer
  • Windows 10 (64 bit platforms)

Minimum:

  • Android 6.0 (Marshmallow) or newer (API level 23 or higher)
  • FreeBSD 11 (64 bit platforms)
  • iOS 8.1 or newer
  • Linux (Ubuntu 14.04 LTS or newer, Debian 8 or newer; 64 bit platforms)
  • macOS 10.10 or newer
  • Windows 10 or newer (64 bit platforms)

Supported CPUs by OS:

  • Android: x86, x86_64, armeabi-v7a, arm64-v8a
  • iOS: x86, x86_64, armv7, armv7s, arm64
  • Linux: x86_64, core2, sandybridge, skylake, powerpc (32-bit), armv7 (Raspbian 9.4 on Raspberry Pi3)
  • macOS: x86_64, core2, sandybridge, skylake
  • Windows: x86_64, core2, sandybridge, skylake

 

Additional architecture-specific builds can also be created on demand; please contact ISARA’s sales team.