温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/blog/hello-quantum-safe-world
点击访问原文链接

Hello, Quantum-Safe World!

Hello, Quantum-Safe World! About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers October 13, 2022 Hello, Quantum-Safe World! Written by: Suvi Lampila Quantum computers are no longer science fiction. Their computation power is increasing by leaps and bounds both in terms of the number of usable qubits and optimization in error correction. The recent advances and heavy investment only accelerate the progress.  

Quantum computers will soon pose a credible threat to classical asymmetric cryptographic algorithms used today in every single laptop, mobile phone, and smart device. More importantly, public key algorithms are used in servers – no matter whether they are Unix servers from the last millennia running on data centers, or Linux-based micro-services that spawned up in one of the cloud platforms while you’ve been reading this blog post.  

Quantum threat is real   What makes the quantum threat a pressing issue that needs to be addressed urgently? Harvesting attacks have become lucrative and more feasible when data storage has become more affordable. 

While cryptographically relevant quantum computers do not exist yet - your secrets do. Your encrypted data can be recorded now and stored by the attacker to be decrypted later. The question to ask is not when will the quantum computer with high-fidelity gates and a sufficient amount of usable qubits be available. The question to ask is: will the secrets I have today remain secret also when that happens?  

It is time for Post-Quantum Cryptography   Transitioning to Post-Quantum Cryptography (PQC) is our best chance to ensure a quantum-safe world. It allows us to continue to use our existing networks and battle-tested protocols like TLS, SSH, and IPsec with upgraded quantum-safe hybrid PQC algorithms. 

PQC algorithms can provide end-to-end security that is difficult and costly to achieve with Quantum Key Distribution (QKD) using specialized hardware with quantum phenomena. We simply do not have the time nor the resources to blanket the earth with optic fiber. Even if we did, it would still leave the last copper or radio leg of the connection to be secured somehow. Unless you would be willing to trade your mobile phone for a telephone with a fiber cord or a line-of-sight signal base.  

Another advantage of Quantum-Safe PQC, which is run on existing devices and computers, is that it doesn’t have to rely on any custom hardware. There is also no implicit trust placed on third parties. Optic fiber requires repeaters to strengthen the signal along the way, which makes the repeater a man-in-the-middle by design. There are some feasible production-ready, albeit expensive use cases for safe Quantum Key Distribution: think of clear blue skies with a LASER beam pointing to a satellite, but that does not solve the quantum threat right here on earth. 

Take the quantum leap with SSH  It took almost two decades to deploy the backbone of our classic security - the public key cryptography (PKC) infrastructure. It's no surprise that getting quantum-safe will take time too - migration to quantum-safe cryptography does not happen overnight. Start now. 

Learn more about SSH’s Quantum-Safe Cryptographic Security Solutions >>>

 

 

 

Tag(s): Post-Quantum Cryptography Suvi Lampila Suvi Lampila is an SSH Fellow. Suvi has been with SSH since 2001 and has held various positions in technical support, quality assurance, and professional services in Finland and Hong Kong. She guides developers across product teams in PQC and PKI, mentors SSH's experts and young talent, and is closely involved in...

Other posts you might be interested in Privileged Access Management 6 min read | February 17, 2026 Zero-Day Cyberattack on Major Telcos in Singapore: Lessons on Securing Privileged Access to Critical Systems  Read More Privileged Access Management 6 min read | February 9, 2026 How to break up with your password Read More Privileged Access Management 7 min read | February 3, 2026 SSH and Leonardo: A Strategic Partnership for Trusted European Cybersecurity  Read More Subscribe to email updates SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录