Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready : Harvest and Decrypt

Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future arrival already puts many aspects of information security at risk today because of “harvest-and-decrypt” attacks, for example, where adversaries collect and store encrypted data with the intention of decrypting it in the future.

Now, business leaders recognize that they need to start preparing and are asking how they can become ‘quantum-ready.’

For security leaders, protecting your organization’s critical assets, products and confidential data using a quantum-safe method is essential. We will discuss two such approaches: quantum-safe cryptography and quantum key distribution.

Continue Reading

The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public key cryptography. For many, this information might come as a surprise. There seems to be a new security breach almost every day, most recently a bug was discovered in Intel’s chips affecting most computers. Yet modern public key cryptography such as RSA and elliptic-curve cryptography (ECC) – the very foundation of cybersecurity – haven’t been broken via an efficient attack on commercialized products when implemented correctly.

Continue Reading

  The following is an excerpt from a contributed opinion piece on CSO Online by Scott Totzke, CEO & Co-Founder of ISARA Corporation. In recent years, there has been an undisputed increase in enterprise data breaches across the globe. At first, this was only a concern for IT, CISO’s and CIO’s. However, with growing fiduciary responsibility, cybersecurity […]

Continue Reading

Scott Totzke, CEO & Co-Founder of ISARA Corporation states that ISARA aims to, “build a business around next-generation security encryption technology to address the threats that come with quantum computers.” There are varied opinions on when quantum computing will gain the power needed to break today’s encryption, although Totzke emphasizes the divide that will occur […]

Continue Reading

Scott Totzke, CEO & Co-Founder of ISARA Corporation explains that “classes of problems that are impossible to solve on a classical supercomputer become easy to solve when you have a large-scale quantum computer. One of those is the underlying math that protects (our) secure transactions today.” RSA, for example, is one of the key encryption […]

Continue Reading

Harvest and decrypt is just one scheme that will compromise key data upon the introduction of quantum computers. It has already been proven that today’s encryption, including RSA and ECC, will be broken by a large-scale quantum computer using Shor’s algorithm. Author Meredith Rutland Bauer explains: “Internet users like me have long relied on encryption […]

Continue Reading

Author Terry Pender provides insight into ISARA Corporation’s first two years as a startup in Waterloo’s Quantum Valley. Scott Totzke (CEO), Mike Brown (CTO) and Mark Pecen (COO), clarify the existing quantum threat and the urgency surrounding implementing a secure and viable solution. “As an industry, we’ve only got five years to get a solution […]

Continue Reading

In this interview, Scott Totzke, CEO & Co-Founder of ISARA Corporation, answers why he founded ISARA, what’s next following recent product launches, and how ISARA will help customers navigate their quantum security risks in today’s world. When asked why ISARA is unique, Totzke explains, “We are the first to market with a product that can […]

Continue Reading

Mike Brown, CTO & Co-Founder of ISARA Corporation, clearly explains how the age of quantum computing will put today’s encryption at risk. “The assumptions that we’ve made in a lot of our Internet-based systems, that this is safe because of the fact that classical computers can’t solve it, that doesn’t hold anymore in the context […]

Continue Reading