Unlike traditional public-key cryptosystems based on a single standard, post-quantum cryptosystems are based on a family of algorithms depending on function, use case or country-based regulations. This family is likely to expand or adapt to meet further standards in the coming years. On-going updates regarding availability and configurability are therefore critical. CryptoNext’s solutions are natively crypto-agile.
The CryptoNext Quantum Safe Library contains CryptoNext’s core technology for all of its products. It’s a high performance, fully functional, crypto-agile library layer that:
- Provides the most comprehensive set of post-quantum cryptography algorithms (NIST selection + EU National Agencies additional recommendations)
- Is developped in both C & ASM to run and be optimized for the most common processing units and OS platforms
- Brings a full set of functional modules and API’s to upgrade IT equipment, applications and security infrastructures to pure or hybrid quantum safe security adapted to each use case.
Our technology is specifically designed for embedded systems operating in constrained environments. It features a lightweight version of our Quantum-Safe Library, complemented by a suite of embedded applications and plugins.
CryptoNext Quantum Safe products include PQC implementations for Secured Communications, System, Network and Security Infrastructure.
The Quantum threat has shed a light on the necessity to better manage cryptography in Corporate IT infrastructures. CryptoNext Security offers a suite of solutions to inventory crypto assets and orchestrate crypto policies edition and distribution in an application portfolio.
CryptoNext supports clients at each stage of their quantum transition action plan with service options that meet expected Customer Service Level Agreements (SLAs).
Today’s classic Public-Key Cryptosystems are mostly based on the standard Rivest, Shamir and Adleman (RSA) encryption algorithm. A few systems have migrated to Elliptic Curve Cryptopgraphy (ECC) a key- based technique for encrypting data.
The Quantum threat requires the implementation of new Post-Quantum Cryptography algorithms and technologies.
Updating physical protection against physical (side-channel) attacks is also critical, especially in the IoT space.
Post-Quantum remediation is essential for the vast majority of systems and applications. Implementation challenges may be significant in certain environments.
CryptoNext C-QSR is widely available and ensures the performance and optimization of remediation technology. It enables organizations to acquire knowledge and gain global control of their PQ management and implementation plan.
Standards are critical for a trusted and interoperable Post-Quantum ecosystem. Regulation bodies such as the NIST, IETF or National US and EU Agencies have achieved major milestones preparing these PQ standards, best practices and certification processes.