ISARA Insights Blog
Tags:
Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready
Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future arrival already puts many aspects of information security at risk today because of “harvest-and-decrypt”…
We’re on a mission to create a quantum-safe world
On November 19th, we announced the exciting news that we raised $10 million USD in Series A funding led by Shasta Ventures. This is in addition to an initial capital investment of $11.5 million USD from Quantum Valley Investments. Subsequently, I’d like to officially welcome Nitin Chopra, Partner at…
The PKI Guy talks quantum-safe security with Alexander Truskovsky
Our Senior Product Manager, Alexander Truskovsky, sat down with Mark B. Cooper of PKI Solutions Inc (A.K.A The PKI Guy) to discuss quantum-safe security, which was released August 1st, 2018.
Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny-based cryptography offers the closest quantum-safe cryptographic primitives…
Why are Washington lawmakers suddenly so interested in quantum tech?
Blockchain. Artificial intelligence. Machine learning. These have all become buzzwords in Washington as lawmakers hear about how these promising technologies are expected to benefit the American public and private sectors alike. The United States’ Congress has sought to understand how these emerging…