ISARA Insights Blog
Tags:
Automotive • Company News • Crypto agility • Crypto Posture • Crypto-agility • Cryptographic Inventory • Cryptographic Migration • Cryptographic Posture Management • Cryptography • Data • Data Security • Defense • Digital Certificates • Digital Signatures • ETSI • Financial • Governance • Government • Hardware Security Module • Harvest and Decrypt • Hash-based • Hybrid Cryptography • Information Technology • Internet of Things • Inventory • Isogeny-based • Key Encapsulation Mechanisms • Lattice-Based Cryptography • NIST • Partnership • PKI • post quantum • Post-Quantum Cryptography • Posture Management • PQC • PQC Readiness • Preparedness • Public-Key Cryptography • Quantum Computing • Quantum computing preparedness • Quantum preparedness • Quantum Readiness • Quantum Ready • Quantum Threat • Quantum-safe • Quantum-safe Cryptography • Roots of Trust • Standards • Webinar • Y2Q • Zero Trust • Zero Trust Architecture •
Feb
26, 2019
NIST Round Two: One Step Closer to Standardization
Best practices for cryptography evolve with time, and staying secure sometimes requires immediate reaction. The transition to Elliptic Curve Cryptography specified by the US National Security Agency's 2005 "Suite B" recommendation included a comfortable transition period. However, in August 2015, the…