The NIST Announcement on Quantum-Resistant Cryptography Standards is Out. Act Now!

The NIST Announcement on Quantum-Resistant Cryptography Standards is Out. Act Now!

An over five-year long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of the NIST Post-Quantum Crypto (PQC) Standardization Process, that is, which quantum-resistant cryptographic algorithms NIST has selected for standardization.

Read more
Crypto-Agility: The Real Gold at the end of the NIST PQC Standardization Rainbow

Crypto-Agility: The Real Gold at the end of the NIST PQC Standardization Rainbow

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for post-quantum cryptography standards and the importance of future-proofing how we use cryptography to protect data in the advent of quantum computing and beyond.

Read more
NIST PQC Finalists Update: It’s Over For The Rainbow

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes has received its final nail in the coffin: Ward Beullens, a PostDoc at IBM Research, published a practical key recovery attack against the Rainbow signature scheme.

Read more
Crypto-Agility in the Advent of Post Quantum Computing

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to threats it will present once it arrives.

Read more
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to standardize post-quantum cryptography (PQC), NIST has begun the process of evaluating several PQC candidates in order to standardize one or more public-key algorithms that are quantum-resistant.

Read more
When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

For years there has been persistent chatter that quantum computing is coming, and organizations should be prepared for its arrival. But what exactly is quantum computing and why should organizations be concerned about its impact on cybersecurity? This article explains what quantum computing is, when it is expected to arrive, and what is its anticipated impact on cybersecurity.

Read more
RSA is not destroyed, but do remain vigilant and be crypto-agile!

RSA is not destroyed, but do remain vigilant and be crypto-agile!

During the last couple of weeks, a little shake went through parts of the security community. This was caused by a preprint by Professor Dr. Claus Peter Schnorr titled “Fast Factoring Integers by SVP Algorithms”, published on the IACR’s E-print Server.

Read more
Building Security Systems for the Internet of Things and Crypto Agility

Building Security Systems for the Internet of Things and Crypto Agility

There is no silver bullet when it comes to securing “the” Internet of Things, instead, a careful analysis of the individual application is needed. In this article we explore a methodical, yet pragmatic approach to securing IOT devices.

Read more
Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

The business world today is built on the pervasive use of cryptography, to authenticate people and processes, to secure communications, and to protect sensitive data.

Read more