Post Quantum Crypto Agility
Applications

Post Quantum Crypto Agility (Future proofs & PQC)

Quantum supremacy and the ever increasing threat

Quantum computing is on the brink of becoming a reality and has the potential to revolutionise computing, communications and artificial intelligence. However, getting into the wrong hands, this technology will be able to decipher asymmetric algorithms. While symmetric algorithms with sufficient key length are currently believed to be secure, some of the main asymmetric algorithms used to protect critical infrastructure, software updates, payment mechanisms, media streaming, IoT devices, connected cars, government or financial secrets or documents will become compromisable.

Standardization bodies like NIST have so far only identified “candidates” which are promising, although still need to pass the test of time. However, they are most likely to evolve or be exchanged based on new evidence and advances in cryptographic science.

Given the high probability that Quantum computing will emerge during the life span of any newly purchased IT architecture, the systems should be quantum proof based on current understanding and also crypto-agile to gradually adapt, with evolving technology and knowledge.

Utimaco provides solutions which are quantum proof as well as compliant to industry regulations and combines this with a crypto-agile overall setup, allowing for rapid upgrades to new status quos with low involvement of costs and manpower.

Business value

Business value

Icon

Quantum Resistant Cryptography

Creates a crypto agile, future-proof infrastructure and tools for:

  • Applying PQC algorithms
  • Digital Certificates
  • Code Signing
  • PKI
  • Quantum Key Generation & Distribution
  • Key Injection (IoT)
  • Hybrid Certificate
  • Random number generation
  • and provides hardware backed PQC algorithm support.
Icon

Compliant product firmware extension

  • Is and remains in full compliance with NIST candidates and recommendations by BSI (Federal Office for Information Security, Germany).
  • Provides a quantum safe product extension for SecurityServer Se Gen2/ CSe-Series and simulators.
  • Ensures PQC consultancy for the right choice of algorithms and roadmap towards quantum-safe IT security infrastructures.
Icon

Remote Access

Supports remote distribution of keys to deployed (POI) terminals through Remote Key Delivery

Icon

Software Simulator included

Included simulator allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Deployment options

Deployment options

Icon

On Premise

  • Useful for centralized use cases without a requirement of scalability or remote accessibility and existing legacy infrastructure
  • Defined total cost of ownership
  • Complete control on hardware and software, including configuration and upgrades
  • Secured uptime in areas with insatiable internet connectivity
  • Preferred choice in industry-segments where regulation imposes restrictions
Icon

In the Cloud

  • Strategic architectural fit & risk management for your high value assets
  • Provides flexibility, scalability and availability of HSM-as-a-service
  • Ideal for a multi-cloud strategy, supporting multi-cloud deployments & allows for migration flexibility
  • Allows you to seamlessly work with any Cloud Service Provider
  • Easy-to-use remote management and on-site key ceremony service option
  • Full control over data through  encryption key life-cycle and key administration
  • Secured data privacy through Bring-Your-Own-Key procedures

Contact us

We look forward to answering your questions.

Nehmen Sie Kontakt auf

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Ihnen helfen kann.