The ISARA Radiate Security Solution Suite offers an implementation of cryptographic algorithms resistant to quantum computer attacks through a lightweight library with a C language interface. This toolkit is the first opportunity for customers to start deploying quantum resistant technology in a variety of commercial solutions, through drop-in algorithm replacements that allow them to build products with an emphasis on quality assurance and efficient integration.
For more information about ISARA's quantum resistant solutions, visit our website: www.isara.com.
You can also contact us directly at firstname.lastname@example.org.
Copyright © 2016-2018 ISARA Corporation, All Rights Reserved.
ISARA Radiate Security Solution Suite 1.4 Samples
Each sample demonstrates one part of the toolkit. We use the Dilithium samples to produce digital signatures of the toolkit's installation packages, for example.
- Android 7.0 (Nougat) or newer (API level 24 or higher)
- iOS 10 or newer
- Linux (Ubuntu 16.04 LTS or newer, Debian 9.1 or newer; 64-bit platforms)
- macOS 10.11 or newer
- Windows 10 (64-bit platforms)
- Android 6.0 (Marshmallow) or newer (API level 23 or higher)
- iOS 8.1 or newer
- Linux (Ubuntu 14.04 LTS or newer, Debian 8 or newer)
- macOS 10.10 or newer
- Windows 7 or newer (64-bit platforms)
Supported Architectures by OS:
- Android: x86, x86_64, armabi-v7a, arm64-v8a
- iOS: x86, x86_64, armv7, armv7s, arm64
- Linux: x86_64, core2, sandybridge, skylake
- macOS: x86_64, core2, sandybridge, skylake
- Windows: x86_64, core2, sandybridge, skylake
Additional architecture-specific builds can also be created on demand; please contact ISARA’s sales team.
Sample code for the ISARA toolkit. We're rearranged the samples so reduce the number of top-level directories:
aead_chacha20_poly1305- ChaCha20/Poly1305 AEAD encryption and decryption.
chacha20- ChaCha20 encryption and decryption.
dilithium- Dilithium digital signature system.
ecdh- Elliptic curve Diffie-Hellman key exchange.
hash- Hashing using any of our supported hash algorithms.
hmac- Hash-based Message Authentication Codes using any of our supported algorithms.
kdf_concatenation- Tool for deriving keys using the NIST SP 800-56A Alternative 1 Concatenation KDF scheme.
kdf_pbkdf2- Tool for deriving keys using the Password-Based Key Derivation Function 2 from IETF's RFC 2898.
kdf_rfc5869- Tool for deriving keys using the HMAC-based Extract-and-Expand Key Derivation Function from IETF's RFC 5869.
kyber- Kyber key-encapsulation mechanism.
lms- Leighton-Micali One Time Signature digital signature scheme.
luke- LUKE (Lattice based Unique Key Establishment) key exchange.
mceliece- McEliece QC-MDPC key-encapsulation mechanism.
newhope- NewHope key exchange.
ntruprime- NTRUPrime key-encapsulation mechanism.
poly1305- Poly1305 message authentication codes.
rainbow- Rainbow digital signature scheme.
rng- Random number generators.
sidh- Supersingular Isogeny Diffie-Hellman key exchange.
xmss- eXtended Merkel Signature System digital signature scheme.
We've switched to building the samples all at once with
cmake. You can still
build them separately using the
CMakeLists.txt found in each directory.
Before building the samples, copy one of the CPU-specific versions of the toolkit libraries into a
libdirectory. For example, to build the samples for Intel Core 2 or better CPUs, copy the contents of
To build the samples:
- Install the toolkit somewhere, e.g.
cdto the sample subdirectory, such as
- Run CMake:
cmake -DIQR_TOOLKIT_ROOT=/path/to/toolkitroot/ .or
IQR_TOOLKIT_ROOT=/path/to/toolkitroot cmake .
- Run make:
For more details and tool requirements, please refer to the Developer's Guide documentation.
The samples use the
IQR_TOOLKIT_ROOT CMake or environment variable to
determine the location of the toolkit to build against. CMake requires that
environment variables are set on the same line as the CMake command, or are
exported environment variables in order to be read properly.
See the individual
README.md files in the sample subdirectories for
instructions on running specific samples.
LICENSE file for details:
Copyright 2016-2018 ISARA Corporation
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.