What is Cryptographic Agility?

Agile Cryptography or as we like to call it, Crypto Agility, allows a system to easily adopt alternative cryptographic primitives and algorithms without significant changes to a system’s digital infrastructure. It empowers organizations with greater autonomy and proactive control over their digital ecosystem in any encryption environment.
With over 150 years of collective experience in the Security and IT industry, Infosec Global provides technology innovation, thought leadership and expertise in cryptographic life-cycle management.

As InfoSec Global is a company rooted in cryptographic research, we are leading experts when it comes to understanding, researching and simplifying Crypto Agility. Crypto Agility is one of the many disciplines our team of leading expert cryptographers focus on.

Our Research

Check out the research achievements our team has accomplished thus far.

Dr. Vladimir Soukharev
Principal Cryptographic Technologist
10+ years of experience leading cryptography and post-quantum initiatives.
Adrian Antipa
Chief Cryptographic Scientist
25 years of continuous work in cryptography: design, analysis, implementation & deployment.

As Quantum Computer’s Risks Threaten to Undermine Its Benefits, Infosec Global Answers NIST Call with Two Crypto Solutions

Vladimir Soukharev
> Learn More

Post-Quantum Cryptographic Solution based on Elliptic Curves – Supersingular Isogeny Key Encapsulation (SIKE).

Vladimir Soukharev
> Learn More

Crypto Agility is a Must-Have for Data Encryption Standards.

Nagy Moustafa and Vladimir Soukharev.
> Learn More

SPHINCS+

Daniel J. Bernstein, Christoph Dobraunig, Maria Eichlseder, Scott Fluhrer, Stefan-Lukas Gazdag, Andreas Hülsing, Panos Kampanakis, Stefan Kölbl, Tanja Lange, Martin M. Lauridsen, Florian Mendel, Ruben Niederhagen, Christian Rechberger, Joost Rijneveld, Peter Schwabe.
> Learn More

Supersingular Isogeny Key Encapsulation (SIKE)

David Jao, Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, Amir Jalali, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir Soukharev, David Urbanik.
> Learn More

Watch our Experts

ISG’s Dr. Vladimir Soukharev: How to be Ready for Tomorrow's Quantum Attacks - Isogeny-Based Quantum Resistant Undeniable Signatures.

Conferences

Panel Discussion: The Evolution of Cybersecurity in the Age of Quantum

Opportunity Locks 2020

Discovery of Quantum Vulnerable Cryptography and Migration to Post-Quantum Cryptography

NIST Virtual Workshop on Considerations in Migrating to Post-Quantum Cryptographic Algorithms

Latest Update on Post-Quantum Cryptography and Transitioning Process

FSP 2020

International Security in the Era of Quantum Computing

CyberSec Forum 2020

Hybrid Key Agreement/KEM Construction and Integration to IPSEC IKEV2 VPN (Q42A)

ICMC 2020

Agility and Private Keys

ICMC 2020

Cyber Security and Data Protection

Berne Union Annual General Meeting 2018:

Blockchain: Security and Vulnerabilities

Crypto Valley Blockchain Event 2018

Cryptography Life Cycle Management

PrimeKey PKI Tech Days 2018

Agile Cryptography

Above & Beyond PKI 2018

Efficient Application of Countermeasures for Elliptic Curve Cryptography

International Cryptographic Module Conference 2017

Isogeny-based Quantum-Resistant Group Key Agreement

International Cryptographic Module Conference 2018

The Post-Quantum Crypto World and the Need for Crypto Agility

International Cryptographic Module Conference 2018

Agile Cryptography

Primekey Tech Days 2017

How to be Ready for Tomorrow’s Quantum Attacks

International Cryptographic Module Conference 2017

How to be ready for tomorrow’s quantum attacks.

Primekey tech days 2016

Our Insights

Product Datasheets, Case Studies, White Papers

Datasheet
Open Source Security
Open Source Cryptography is incredibly powerful and enables enterprises to rapidly deploy crypto in their solutions - but not without risks.
Datasheet
Crypto Analytics Product Overview
Crypto Analytics is a ground-breaking enterprise solution developed by InfoSec Global to manage cryptographic risks automated the reporting of hidden cryptographic vulnerabilities.
Case Study
Top 10 Crypto Analytics Questions
Frequently asked questions about Crypto Analytics
Datasheet
Trust Management Root
The Trust Management Root solution is composed by an end-point component, integrated within root-of-trust, and a management component, deployed within company infrastructure, to control lifecycle of keying material and cryptography.
Whitepaper
Crypto Analytics White Paper
Poor implementations of cryptography and weak algorithms threaten businesses by lulling them into a false sense of security
Datasheet
AgileSec VPN Brochure
AgileSec VPN solution developed and supported by Infosec Global that can be configured to use standard-based, sovereign, or custom cryptography in virtual private networks that require premium security.
Datasheet
AgileSec Crypto SDK Datasheet
Reach new customers in new markets by adding sovereign- and standards-based encryption, digital signatures, and other security mechanisms into your secure products.
Whitepaper
Cryptographic Agility White Paper
As crypto adversaries use continuously increasing computational power and mathematical research to break currently secure cryptographic algorithms, it is crucial to future-proof today's critical systems with crypto agility.