CRYPTOMATHIC BLOG

 

Crypto-Agility (2)

3 min read

NIST Releases Quantum-Resistant Cryptography Standards. Act Now!

An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...

Read More
Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

3 min read

Crypto-agility: The Gold at the End of the Rainbow for NIST PQC

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...

Read More
NIST PQC Finalists Update: It’s Over For The Rainbow

4 min read

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...

Read More

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

2 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More

3 min read

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

3 min read

Quantum Computing and Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...

Read More

5 min read

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...

Read More

3 min read

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...

Read More