ISARA Announces Release of Updated Radiate Solution Suite : Roots of Trust

ISARA Radiate™ 1.4, released on March 27, 2018, includes stateful hash-based signatures such as LMS and XMSS, that allow embedding of hash-based roots of trust to ensure today’s software updates are quantum-safe. When discussing the urgency to focus on roots of trust, Mike Brown, Chief Technology Officer at ISARA Corporation states, “There is another aspect of […]

Continue Reading

The ISARA Radiate™ Security Solution Suite 1.4 includes a complete set of stateful hash-based signature options and their implementation on a Hardware Security Module (HSM).

Continue Reading

With the latest release of the ISARA Radiate™ Security Solution Suite, we’ve added stafeful hash-based signatures, specifically eXtended Merkle Signature Scheme (XMSS), to the cryptographic library. With this addition, we now offer complete stateful hash-based signature algorithm support.  Also, using a unique optimization approach, we’ve successfully overcome the recognized challenges associated with implementing stateful hash-based signatures to create an HSM-based implementation successfully tested with Utimaco Inc.’s SecrutyServer.

Continue Reading

The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public key cryptography. For many, this information might come as a surprise. There seems to be a new security breach almost every day, most recently a bug was discovered in Intel’s chips affecting most computers. Yet modern public key cryptography such as RSA and elliptic-curve cryptography (ECC) – the very foundation of cybersecurity – haven’t been broken via an efficient attack on commercialized products when implemented correctly.

Continue Reading

Today, remotely updating a device’s software – such as a connected car or smartphone – is easy and cost-effective. There’s no need to physically return the device to the manufacturer, which happily saves everyone time and valuable resources.

Continue Reading

ISARA Corporation, the leading provider of security solutions for the quantum computing age, and Utimaco Inc., a worldwide provider of cybersecurity solutions, announced today that they successfully ran quantum-safe hash, lattice and multivariate-based digital signature algorithms for a Hardware Security Module (HSM) in initial laboratory testing.

Continue Reading

ISARA Corporation, the leading provider of security solutions for the quantum computing age, today announced the release of its newest version of the ISARA Radiate Security Solution Suite.

Continue Reading

Scott Totzke, CEO & Co-Founder of ISARA Corporation states that ISARA aims to, “build a business around next-generation security encryption technology to address the threats that come with quantum computers.” There are varied opinions on when quantum computing will gain the power needed to break today’s encryption, although Totzke emphasizes the divide that will occur […]

Continue Reading

Harvest and decrypt is just one scheme that will compromise key data upon the introduction of quantum computers. It has already been proven that today’s encryption, including RSA and ECC, will be broken by a large-scale quantum computer using Shor’s algorithm. Author Meredith Rutland Bauer explains: “Internet users like me have long relied on encryption […]

Continue Reading

Author Terry Pender provides insight into ISARA Corporation’s first two years as a startup in Waterloo’s Quantum Valley. Scott Totzke (CEO), Mike Brown (CTO) and Mark Pecen (COO), clarify the existing quantum threat and the urgency surrounding implementing a secure and viable solution. “As an industry, we’ve only got five years to get a solution […]

Continue Reading