Most encryption in use today will be broken by quantum computers within this decade. Most security vendors are not prepared. We deployed post-quantum cryptography to production in 2025 — among the first European cybersecurity platforms to do so.
State-level adversaries are already capturing encrypted traffic at scale — not because they can decrypt it today, but because they will be able to within years.
Adversaries record encrypted communications, financial records, medical files, government correspondence. They can't read it yet — but they store it.
Cryptographically relevant quantum computers (CRQCs) are projected to break RSA, ECC, and Diffie-Hellman within this decade. The exact year is debated, the direction isn't.
Everything captured today gets decrypted. Long-lived sensitive data — IP, contracts, medical records, classified communications — is exposed years after it was supposedly secure.
We use a hybrid cryptographic stack — classical algorithms (proven, time-tested) running alongside post-quantum algorithms (resistant to known quantum attacks). Both must fail before the connection is compromised.
This isn't theoretical. Hybrid PQC has been live in identiqa production since 2025 across all customer-facing endpoints in ProtectionGrid — TLS handshakes, VPN tunnels, internal service-to-service authentication, customer data at rest.
Why hybrid rather than pure PQC? PQC algorithms are new. Classical algorithms have decades of cryptanalytic scrutiny. Combining both means a flaw in either layer doesn't compromise the system — a defensive posture that NIST and ENISA both recommend during this transition period.
Every algorithm in our PQC stack went through 8+ years of NIST evaluation and global cryptanalytic review. We don't roll our own crypto.
Module-Lattice-Based Key Encapsulation Mechanism. Based on Kyber. Used for establishing shared secrets in TLS handshakes, VPN tunnels, and service-to-service authentication. We deploy ML-KEM-768 as our default security level.
Module-Lattice-Based Digital Signature Algorithm. Based on Dilithium. Used for code signing, certificate signatures, and document attestation. ML-DSA-65 is our default — balancing signature size against security level.
Stateless Hash-Based Digital Signature Algorithm. Based on SPHINCS+. Used where maximum conservatism is required — long-term archival signatures, root certificates, audit log attestation. Slower than ML-DSA, but built on different mathematical assumptions.
Hybrid PQC isn't a marketing claim on a future roadmap — it's running across our infrastructure today.
All customer-facing TLS endpoints negotiate hybrid handshakes when the client supports them. ProtectionGrid modules, CyberHub portal, API gateways.
Live since 2025Internal service-to-service communication uses hybrid mTLS. Every microservice authenticates to every other microservice with both classical and post-quantum credentials.
Live since 2025Customer data stored for extended periods (logs, backups, evidence packages) is encrypted with hybrid PQC envelope encryption. Even if classical layer breaks, data stays protected.
Live since 2025Our cryptography team runs technical sessions for prospective customers and journalists — architecture review, threat modeling for your specific data lifetime requirements, cryptographic agility roadmap. Typically 60 minutes, signed NDA, no marketing.