3 min read
Crypto-agility: The Gold at the End of the Rainbow for NIST PQC
Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...
3 min read
Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...
4 min read
Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...
5 min read
There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...
2 min read
Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...
3 min read
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
3 min read
The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...
5 min read
In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...
3 min read
The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...
2 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.