Quantum Ready

Agility is the Key to Quantum Safe, Begin Migration Today.

The Problem

Quantum computing will break current cryptography

Quantum computing could obliterate the already-strained systems of public-key cryptography that allow today’s digitally connected networks to function securely. In a post-quantum world, nothing is safe: public-key protocols that safeguard every online transaction—shielding everything from small purchases to large financial transactions; personal conversations to security secrets; consumer data to critical infrastructure—will be vulnerable.  The arrival of large-scale quantum computers is estimated as soon as 5-10 years—the National Institute of Standards and Technology (NIST), a non-regulatory agency of the US Department of Commerce, has issued a request for public-key post-quantum cryptographic algorithms. It is a call for solutions to the looming threat of quantum computing's potential to shatter even today’s toughest encryption codes.

Quantum Safe Solution

ISG’s co-founder Dr. Taher Elgamal and our crypto leadership team and board are responsible for many of the global standards that are in place today (i.e. SSL, AES). ISG’s post-quantum research, led by Dr. Vladimir Soukharev and Dr. Tomislav Nad are globally recognized and have partnered closely with Microsoft, Amazon, and academia on two NIST submissions, which were recently presented at the NIST workshop in April. ISG’s Cryptographic Lifecycle Management solution provides a post-quantum migration plan that includes threat management, crypto agility, and a quantum safe VPN. The team’s unique innovation, agility patents and post-quantum crypto NIST submissions position ISG’s solution ahead of any other company in this space. The agility and interoperability that ISG’s platform enables are unique differentiators to prepare for post-quantum because no matter what standards are announced by NIST over the next few years, ISG’s Agility Platform will make that transition seamless. Enterprises can begin transitioning today with ISG’s Agility Platform.
Analyze Your Current Situation
Leverage ISG's cryptography experts and AgileScan to analyze your cryptographic infrastructure
Get my Free Scan
Define Post-Quantum Strategic Planning
Leverage ISG's cryptography experts to define a post-quantum computing (PQC) plan and strategy
Contact ISG
Implement Quantum Safe Solutions
Leverage solutions and crypto-agility platform provided by ISG
in order to be ready for a post-quantum reality
Learn More

Watch our Experts

ISG’s Dr. Vladimir Soukharev: How to be Ready for Tomorrow's Quantum Attacks - Isogeny-Based Quantum Resistant Undeniable Signatures.

PQC Expertise

ISG is working on compelling candidates to the NIST PQC Competiton.


(Supersingular Isogeny Key Encapsulation) is an isogeny-based cryptography solution which uses supersingular elliptic curves. The underlying hard problem for isogeny-based cryptography (given two isogenous supersingular elliptic curves, find an isogeny between them) is based on a non-commutative structure, which currently makes it unbreakable for a quantum computer. This allows for greater familiarity when it is time to implement the new encryption, and a high level of efficiency with the ability to reuse existing arithmetic and the smallest post-quantum key sizes currently proposed.

> Learn more about SIKE


SPHINCS+ is a public key signature scheme based on hash functions. Contrary, to classical public-key schemes, quantum computers do not break hash functions. Hash functions are well known and extensively studied constructions in cryptography. Every signature scheme uses a cryptographic hash function but hash-based signatures use nothing else. SPHINCS+ builds on SPHINCS by introducing several improvements regarding security and efficiency. SPHINCS+ is a practical and stateless hash-based signature scheme, making it probably the most attractive answer to quantum-safe signature schemes.

> Learn more about SPHINCS+
Explore PQC Status

For More Information

AgileSec VPN
AgileSec VPN solution developed and supported by Infosec Global that can be configured to use standard-based, sovereign, or custom cryptography in virtual private networks that require premium security.
February 5, 2017