While post-quantum cryptography is currently be standardized, PQSecure is developing and prototyping market ready solutions so companies adopt, begin the transition, or just wanting to be more crypto-agile so they can switch when the time is right.
IoT security adds challenges of its own. Small 8-, 16-, and 32-bit processors have extremely limited memory, usually run on limited power, and transfer information over a limited bandwidth channel. Quantum computers threaten classical cryptographic solutions, but post-quantum solutions tax these limited resources. Our approach reduces the amount of resources need to keep any device safe and secure.
|Classical Cryptography refers to cryptographic solutions in place today, usually referring to solutions which were designed before the need of quantum-safe cryptography. PQSecure offers multiple standardized solutions of ECC, AES, SHA-2/3.||Hybrid cryptography utilizes a classical public key algorithm with a post-quantum public key algorithm to combine the trusted security of years of research with the security benefits post-quantum cryptography offers. PQSecure’s hybrid solutions are designed to offer the security of both algorithms, without the additional costs to power and storage.||Post-Quantum Cryptography is still be standardized, but PQSecure is developing solutions for companies ready to switch today (or tomorrow). Our post-quantum solutions focus on isogeny-based and lattice-based solutions submitted to the NIST PQ Standardization process.|
Hardware vs. Software Solutions
Hardware Solutions: We offer our post-quantum solutions in Xilinx, Intel, Microchip FPGAs as well as eFPGAs and ASIC. Our hardware IPs are available in Verilog and VHDL with countermeasures against known side-channel attacks (timing attacks and power analysis) with test and verification suites recommended by standardization bodies. For details, please contact us.
Software Solutions: We offer software libraries for 8-bit and 16-bit Microchip and Texas Instrument microcontrollers, ARM (32- and 64-bit) processors, and 64-bit Intel and AMD CPUs. Our software libraries are available in C as well as hand-crafted Assembly with countermeasures against known side-channel attacks (timing attacks and power analysis) with test and verification suites recommended by standardization bodies. For data sheets, please contact us.