DigiCert, Gemalto and ISARA to provide quantum-proof certificates : PKI

Hardware security modules (HSM) and digital certificates are critical pieces of technology in securing today’s online transactions and communications. Our partnership with DigiCert and Gemalto aims to create a quantum-safe digital certificate and secure key management solution.

Continue Reading

Over the past few decades, many organizations and governments have made substantial investments to deploy public key infrastructure (PKI) systems. These systems provide the essential elements required to secure their networks, devices, communications and even physical facilities access. With the availability of large-scale quantum computers within the next eight to 15 years, these investments need to be protected by migrating to quantum-safe versions of cryptographic primitives.

In this white paper, you will learn how ISARA’s unique crypto-agile certificates allow large organizations and governments to migrate their PKIs to quantum-safe security seamlessly, including:

Gaining an understanding of how quantum computers affect PKI
How to effectively choose a quantum-safe digital signature
Current migration challenges organizations and governments need to be aware of
How to use ISARA’s crypto-agile certificates to migrate PKI systems seamlessly

Continue Reading

ISARA Corp., the leading provider of security solutions for the quantum computing age, and Certified Security Solutions (CSS), the leader in PKI-based digital identity software and services announced today that their innovative partnership has resulted in release of the world’s first quantum-safe, full-stack public key infrastructure (PKI) solution.

Continue Reading

Recently, Cisco Systems and ISARA Corporation collaborated to test digital certificates, operable in both classic and quantum-safe algorithm modes. Alex Truskovsky, Senior Product Manager at ISARA Corporation, stated, “The incredible potential of quantum computers also presents the challenge of keeping data safe. This proof-of-concept project with Cisco demonstrates how a single digital certificate can accommodate […]

Continue Reading

Cisco Systems and ISARA Corp., the leading provider of security solutions for the quantum computing age, today announced the world’s first collaboration to test digital certificates that operate in both classic and quantum-safe algorithm modes.

Continue Reading

Crypto-agility is the key to cost-effectively migrate information and communication technology (ICT) systems from legacy to quantum-safe systems. By using our unique dual algorithm approach to certificates, this is possible for large organizations and governments.

Continue Reading

Scott Totzke, CEO & Co-Founder of ISARA Corporation, makes clear that the quantum threat needs to be a discussion of urgency. As of now we need individuals and organizations to undersand the impacts quantum computing will have if we take our current predicted timeline lightly and fail to take necessary steps to make our encryption quantum-safe.

Continue Reading

The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public key cryptography. For many, this information might come as a surprise. There seems to be a new security breach almost every day, most recently a bug was discovered in Intel’s chips affecting most computers. Yet modern public key cryptography such as RSA and elliptic-curve cryptography (ECC) – the very foundation of cybersecurity – haven’t been broken via an efficient attack on commercialized products when implemented correctly.

Continue Reading

  The following is an excerpt from a contributed opinion piece on CSO Online by Scott Totzke, CEO & Co-Founder of ISARA Corporation. In recent years, there has been an undisputed increase in enterprise data breaches across the globe. At first, this was only a concern for IT, CISO’s and CIO’s. However, with growing fiduciary responsibility, cybersecurity […]

Continue Reading

What is a cryptographic certificate?
Cryptographic certificates are used to prove a person’s, system’s, company’s or other entity’s identity. Today, cryptographic certificates are based on public key cryptography, and are also known as a “digital certificate” or “identify certificate”, which is an electronic document whose contents can prove the ownership of a piece of information called the “public key”. A certificate functions somewhat like a passport or identity card, in that the counterparty can be reasonably assured of the person holding the certificate’s true identity. This assurance is achieved through the use of a cryptographic function, which is a mathematical operation, the results of which validate the identity of the certificate holder.

Continue Reading