Licenses & subscription
Installation
Configuration
Verification
Compatibility
Future Introduction What is the Quantum Threat? Quantum computing is developing at a fast pace. With the help of Quantum Computers, it will soon be significantly easier to break current data encryption algorithms used in classical Public Key Cryptography. The threat affects all encryption protocols, including the widely popular SSH and TLS. There are no capable Quantum computers yet, why do we need to worry now? Current transmissions can be recorded and decrypted later, exposing the secrets with a delay. Most organizations have long-term secrets that need to be protected for many years. Additionally, with the development in optimization of algorithms and error-correction, even smaller advances in Quantum computing hardware might be able to significantly weaken Classical cryptographic algorithms. Who else is worried about the Quantum Threat? The US House of Representatives has passed a Quantum Computing Cybersecurity Preparedness Act that would prioritize the migration to post-quantum cryptography on an ambitious time scale. In addition, various national information security institutes have been aware of the threat for a longer time, for example, NIST (US) has declared "we must act now" already in 2016. What is the difference between quantum cryptography (QC) and post-quantum cryptography (PQC)? Quantum cryptography uses novel ways of communication that involve Quantum physics. It is designed to be tamper-proof, providing a high level of security, for example, in a dedicated fiber network. It has an extremely high cost of implementation, its production-ready use cases are limited and it is infeasible for most practical applications. Post-quantum cryptography, on the other hand, uses existing computational hardware and communications networks to address the Quantum Threat. Unlike quantum cryptography, it can provide end-to-end security in most use cases. Some PQC implementations are already used in production, for example, in the financial sector. In Secure Shell architecture, what part is the most vulnerable? The Key Exchange used for session keys is the most urgent to be addressed in Secure Shell as the session keys need to withstand future attacks. What do you mean by Quantum-Safe? Quantum Safe systems are sufficiently protected against the Quantum Threat. Currently, in the case of the SSH protocol, this means using post-quantum cryptography (PQC) algorithms as part of the key exchange. What is Tectia Quantum-Safe? A new edition of Tectia, providing Quantum Safe algorithms for Secure Shell Hybrid Key Exchange. Tectia Quantum-Safe Edition is available as subscription and future versions will eventually support also Quantum-Safe signature algorithms for public key authentication when standardization progresses. What are the algorithms implemented by Tectia Quantum Safe? We implement the following Post-Quantum algorithms for SSH Key Exchange: Crystals-Kyber - primary NIST (US) candidate for standardization FrodoKEM - BSI (German) recommendation Streamlined NTRU Prime - retained for OpenSSH compatibility / backup algorithm Saber-Firesaber - retained for backwards compatibility/backup algorithm What is Secure Shell (SSH) Hybrid Key Exchange? Instead of relying solely on classical KEX, Post Quantum Cryptography (PQC) algorithms, SABER, CRYSTALS/Kyber, FrodoKEM or Streamlined NTRU Prime are used in a Hybrid Key Exchange together with a classical ECDH algorithm. Both the PQC and ECDH algorithms contribute to the key material resulting in a session key that is at least as hard to break as the strongest composite. The hybrid approach mitigates the risk of future attacks on recorded secure shell sessions if weaknesses are discovered in either algorithm. Why don't you implement Post Quantum Signatures or Post Quantum Symmetric Crypto? Transition to PQC is an incremental process and the algorithms for different use cases mature at different stages. The existing PQC signature algorithms have not been currently assessed well enough and they might have unknown weaknesses against attacks by Classical Computers and/or Quantum Computers. Unlike with key exchange, the hybrid approach cannot be used with signature algorithms that have to withstand attacks on their own merit. Also, sufficiently long existing authentication keys can still be used securely until day one when a cryptographically relevant quantum computer becomes available so the need is not as urgent as for the key exchange. Because of this, we rely on the Classical algorithms for now, but this will change when there starts to be more widespread acceptance of these new PQC signature algorithms. Symmetric ciphers relying on AES are believed to be safe well into the post-quantum era. The standardization of new symmetric ciphers has not yet begun. Why don't you implement Quantum Key Distribution? Quantum Key Distribution is technically Quantum Cryptography. It requires deploying additional network hardware (dedicated blind fiber) or line-of-sight links and seldom provides end-to-end security. As Quantum Cryptography, it is infeasible for most practical purposes including any use case in the financial sector. Can I protect other TCP applications, such as TLS, with Tectia Quantum-Safe? Yes, it is possible to tunnel any TCP traffic, for example, TLS connections, with Tectia Quantum-Safe to protect the traffic.
Licenses & subscription What do I need to do to get Tectia Quantum-Safe? You need to purchase Tectia Quantum-Safe Edition. If you have an older license of Tectia, you can upgrade that to a subscription contract of Tectia Quantum-Safe. Please contact SSH sales for pricing info and to get your quote. I have purchased Tectia via a reseller, how do I get the Quantum-Safe upgrade? Please contact your reseller for the upgrade. What if I don't have Tectia? You can enter a new subscription contract of Tectia Quantum-Safe without paying an up-front license fee. Please contact SSH sales for pricing info and to get your quote. How do I try Tectia Quantum-Safe before purchasing? You can activate a free trial of Tectia Quantum-Safe. The evaluation version has full functionality and is valid for 45 days from installation. Note that the evaluation version will upgrade your existing Tectia installation and it will stop working after the evaluation period ends unless the version 6.6 license is installed.
Installation Where do I get the binaries for Tectia Quantum-Safe? After login into your account in the SSH Customer Download Center choose your product download - Tectia - Quantum - Server or download - Tectia - Quantum - Client.You should see the version 6.6.0 folder. If you have a valid subscription for Tectia Quantum-Safe but don't see the commercial PQC packages, please contact SSH support or your reseller support. Why can't I see binaries for Tectia Quantum-Safe for my platform? Tectia Quantum-Safe version 6.6.0 only supports Windows, Linux, and AIX. Support for HP-UX and Solaris will be added in version 6.6.2, planned for fall 2022. In the meantime, you are recommended to use Tectia version 6.5.1 on your platform. There are no more packages for 32-bit Intel x86, will they be added later? No, only 64-bit Intel x86-64 platforms are supported for version 6.6 and later. How do I install Tectia Quantum-Safe? Please follow the instructions of the Quick Start Guide (for Unix & for Windows) in the installation package. I installed/upgraded to Tectia Quantum-Safe but it is running as an evaluation version instead of the commercial version, do I need to reinstall it? No, just import/copy the license(s) from the commercial installation package to the licenses directory and restart the application. Configuration How do I enable the Quantum-Safe algorithms? The Quantum-Safe algorithms are enabled by default. If you have a new installation, you don't have to do anything unless you wish to enforce Quantum-Safe algorithms only. If you have a custom setup, you need to enable the algorithms. How do I make sure that only Quantum-Safe connections are used? You need to allow only PQC KEX algorithms. Please note that if you do this, you cannot communicate with a client or server that does not support Quantum-Safe algorithms. Please see ssh-server-config-example.xml and ssh-broker-config-example.xml for instructions on how to enforce the PQC algorithms and allow for specific exceptions. Verification How do I know that my copy of Tectia is a Quantum-Safe Edition? For the Windows Terminal and SFTP GUI Clients, this is visible in the application title. For the command-line clients, invoking sshg3 -V or ssh-broker-ctl-V shows if the PQC feature is available. For the server, please use ssh-server-ctl-V to see the information or the Tectia Server Configuration GUI on Windows. How do I know if Quantum-Safe algorithms are enabled? You can check the enabled KEX algorithms from the Tectia Client Configuration GUI, Tectia Server Configuration GUI, or if explicitly configured directly from the configuration files. How do I know if a certain individual connection is Quantum-Safe? You can find the information in the connection log or in the audit log KEX success message which key exchange algorithm was used. Compatibility How to establish a Quantum-Safe connection between Tectia and OpenSSH? You need OpenSSH version 9.0 or higher. OpenSSH supports Streamlined NTRU Prime in the Hybrid Key Exchange; if you have a custom setup please make sure that sntrup761x25519-sha512@openssh.com algorithm is enabled and on the client-side also preferred. On the Tectia side, please make sure that at least this algorithm is enabled, and on the client-side also preferred over classical KEX. Note that OpenSSH does not support SABER, CRYSTALS/Kyber, or FrodoKEM. How to establish a Quantum-Safe connection between Tectia and a third-party SSH implementation? You need an SSH implementation that supports any of the following Hybrid KEX algorithms: ecdh-nistp521-firesaber-sha512@ssh.com ecdh-nistp521-kyber1024-sha512@ssh.com curve25519-frodokem1344-sha512@ssh.com sntrup761x25519-sha512@openssh.com How to establish a Quantum-Safe connection with Tectia Server for z/OS? You need Tectia Server for z/OS version 6.6.12 or higher. Tectia Server for z/OS supports the following algorithms: SABER, CRYSTALS/Kyber, and FrodoKEM. Future Why was Tectia 6.6.0 only released as Quantum-Safe? This was done in order to have PQC algorithms available for customer production environments faster. We plan to release parallel standard and Quantum-Safe editions in the future. Do you plan to continue delivering updates for non-Quantum-Safe Tectia? Absolutely! From the next version 6.6.2 on, we will proceed with delivering two parallel editions for each Tectia version - one with Quantum-Safe algorithms, the other without. For example, we are planning an overhaul of the Windows GUI client in a future version, which will be available for all Tectia users. Guide to Quantum-Safe Cryptography (QSC)
Learn how your organization can implement QSC and what its benefits are.
SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety. Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki. Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news! Thanks for submitting the form. © Copyright SSH • 2025 • Legal智能索引记录
-
2026-02-27 20:59:54
电商商城
成功
标题:做网站一般需要多久wordpress 网上商城-北京孤凡电子商务有限公司
简介:做网站一般需要多久,wordpress 网上商城,wordpress文字替换,蜘蛛云建网站怎样在移动应用开发与安全分析领
-
2026-02-27 15:59:48
综合导航
成功
标题:Schulmöbel - a2s.com
简介:Entdecken Sie unser vielfältiges Schulmöbel-Sortiment. In De
-
2026-02-27 23:42:53
综合导航
成功
标题:Test and Measurement Equipment Tektronix
简介:Tektronix has over 70 years of experience designing Test and
-
2026-02-27 20:49:11
综合导航
成功
标题:Draped Shoulder Knit Top Cue
简介:Discover the Draped Shoulder Knit Top. Relaxed silhouette wi
-
2026-02-28 00:31:54
综合导航
成功
标题:Jump Ball Web - Play Jump Ball Web Game Online Free
简介:Play Jump Ball Web game online for free on YAD. The game is
-
2026-02-27 14:59:34
综合导航
成功
标题:四年级作文300字
简介:无论是在学校还是在社会中,大家最不陌生的就是作文了吧,作文是人们以书面形式表情达意的言语活动。你知道作文怎样才能写的好吗
-
2026-02-27 15:18:32
综合导航
成功
标题:Webinars Everway
简介:Discover Everway
-
2026-02-28 05:52:59
新闻资讯
成功
标题:如何选择PDU电源配套机柜?, 站长资讯平台
简介:在夏季,不仅要确保数据中心在高温多雨天气下安全、稳定的运维,还要承受降低企业总体运营成本的压力,然而很多机房招投标中并没
-
2026-02-27 19:59:24
综合导航
成功
标题:顺丰同城招聘-三明市沙县区顺成配送有限公司招聘-597直聘
简介:597直聘为您提供顺丰同城招聘信息、公司简介、公司地址、公司福利等详细信息,让您在选择顺丰同城前有一个全面的了解.公司介
-
2026-02-28 02:33:59
综合导航
成功
标题:「electronica China 2021」出展のお知らせ コネクタ メーカー JAE 日本航空電子工業
简介:日本航空電子工業株式会社(JAE)の「electronica China 2021」出展のお知らせがご覧いただけます。
-
2026-02-27 22:48:19
综合导航
成功
标题:Pull The Pin - Play Pull The Pin Game Online Free
简介:Play Pull The Pin game online for free on YAD. The game is p
-
2026-02-27 19:28:15
综合导航
成功
标题:Dead Stop for the Corporate Transparency Act: Part 2 Law.com
简介:Part two of Anthony Sabino’s two-part series analyzing Texas
-
2026-02-28 01:51:35
综合导航
成功
标题:The DAV is looking for volunteers - Classic Hits 100.7 KLOG
简介:100.7 KLOG - Classic Hits, Local News and Sports
-
2026-02-28 05:55:04
综合导航
成功
标题:無線LAN機器 WL54SC 宅内LAN機器の設定 au
简介:無線LAN機器 WL54SCのページです。au携帯電話・スマートフォン(スマホ)やau one net(インターネット・
-
2026-02-27 14:33:36
综合导航
成功
标题:Revista de coches, novedades y pruebas de coches. Reportajes, noticias y artículos técnicos. - km77.com
简介:Revista de coches, novedades y pruebas de coches. Reportajes
-
2026-02-28 00:23:33
综合导航
成功
标题:Innovation in AI and Other Highlights From the CMO Series Live Event Law.com
简介:Ioana Good offers several key insights from attending the CM
-
2026-02-28 05:49:31
综合导航
成功
标题:分身将是什么意思_分身将的词语解释-雄安文学网
简介:分身将是什么意思?雄安文学网为您提供分身将的的意思解释,解读分身将的解释含义,包括基本解释和详细解释等。
-
2026-02-28 01:35:55
综合导航
成功
标题:Embracer Group Has Witten Down 15 Projects, With More Studio Closures & Buyouts Planned - PlayStation Universe
简介:Embracer Group
-
2026-02-28 02:48:44
综合导航
成功
标题:18luck新利官网利app-你玩乐的的好帮手
简介:18luck新利官网专注于为玩家打造无忧的游戏环境。其官方应用程序以简洁流畅的设计、便捷的操作体验和丰富的游戏内容,成为
-
2026-02-27 17:15:15
综合导航
成功
标题:ǁ Cuscus3. World English Historical Dictionary
简介:ǁ Cuscus3. World English Historical Dictionary
-
2026-02-28 05:54:05
综合导航
成功
标题:Whose Role Is It Anyway: Why the State Needs to Lead on Closing Unlicensed Cannabis Shops Law.com
简介:Since New Jersey made the policy decision to enact an extrem
-
2026-02-28 03:29:57
综合导航
成功
标题:† Eternality. World English Historical Dictionary
简介:† Eternality. World English Historical Dictionary
-
2026-02-27 19:34:16
综合导航
成功
标题:AIが変える未来の仕事とは PwC Japanグループ
简介:デジタル化の進展が従業員へもたらす影響に備えるため、企業はどうすべきか。企業がAIとともに発展し、繁栄するための組織づく
-
2026-02-27 19:32:30
综合导航
成功
标题:Audi Q6 e-tron Maniobra de esquiva y eslalon - Revista km77
简介:Audi Q6 e-tron. Maniobra de esquiva y eslalon. Hemos probado
-
2026-02-27 17:35:16
实用工具
成功
标题:纸业公司员工绩效考核表模板-果果圈模板
简介:纸业公司员工绩效考核表模板,模板实用性很强,简约但是框架完整,欢迎大家来下载。
-
2026-02-28 02:56:43
综合导航
成功
标题:ILSC Language Schools Services FREE Job Club
简介:ILSC Australia
-
2026-02-28 02:31:06
综合导航
成功
标题:Xbox One X gets wild new range of Wonder Woman 1984-inspired consoles T3
简介:Three fabulous Xbox One X consoles up for grabs to celebrate
-
2026-02-27 14:53:40
综合导航
成功
标题:スマートテキスタイル対応・新コネクタ開発 RK02シリーズ コネクタ メーカー JAE 日本航空電子工業
简介:高精度なセンシングが必要となるこれからの予防医療に対応するため、日本航空電子工業(JAE)は、スマートテキスタイル対応・
-
2026-02-27 20:28:18
教育培训
成功
标题:医生个人工作年度总结优质五篇 - 豆丁网
简介:豆丁网是面向全球的中文社会化阅读分享平台,拥有商业,教育,研究报告,行业资料,学术论文,认证考试,星座,心理学等数亿实用
-
2026-02-27 19:36:25
教育培训
成功
标题:疫情资料分析常用软件及操作介绍 2009-7-17 - 豆丁网
简介:豆丁网是面向全球的中文社会化阅读分享平台,拥有商业,教育,研究报告,行业资料,学术论文,认证考试,星座,心理学等数亿实用