CRYPTOMATHIC BLOG

 

Crypto-Agility (3)

3 min read

NIST Releases Quantum-Resistant Cryptography Standards. Act Now!

An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...

Read More
Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

3 min read

Crypto-agility: The Gold at the End of the Rainbow for NIST PQC

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...

Read More
NIST PQC Finalists Update: It’s Over For The Rainbow

4 min read

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...

Read More
When Will Quantum Computing Arrive and How Will It Impact Cybersecurity?

4 min read

What is Quantum Computing And How Will It Impact Cybersecurity?

For years, there has been persistent chatter that quantum computing is coming and that organizations should be prepared for its arrival. But what...

Read More
Crypto-Agility in the Advent of Post Quantum Computing

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

3 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
Steps to reach crypto agility to get prepared for quantum computing

3 min read

Steps to reach crypto agility to get prepared for quantum computing

As the scientific community continues to push towards achieving quantum computing on a mass scale, smart companies are busy making preparations for...

Read More
Building Security Systems for the Internet of Things and Crypto Agility

4 min read

Crypto Agility and IoT: Building Security Systems

There is no silver bullet when it comes to securing “the” Internet of Things; instead, a careful analysis of the individual application is needed. In...

Read More
crypto-abstraction-layer

3 min read

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More