Request demo
June 10, 2025

Why It’s Time to Use Post-Quantum Cryptography (PQC) — And How We Help You Get There

 

The urgency to prepare for post-quantum cryptography (PQC) is no longer theoretical — it's real, and it’s now. While quantum computers capable of breaking classical encryption, called cryptographically relevant quantum computers (CRQM), aren't mainstream yet, the threat landscape has changed.   

Let’s look at some of the ways SSH Communications Security can help organizations to stay safe against current and future quantum threats. 

For a quick rundown of the key drivers behind the push to PQC, we recommend reading our blog post on the topic

1. Get a Crypto Inventory - Your Foundation of Migration

By 2028, organizations are expected to have a complete inventory of their cryptographic assets. But waiting until then to start is a mistake. We strongly advocate proactive inventory management now to get visibility into your cryptographic estate.  

We offer the most effective solution on the market for SSH key inventory and management — through our PrivX Key Manager. Unlike traditional Privileged Access Management (PAM) solutions that simply vault keys, our approach goes further: we monitor, track, and manage SSH keys where they are used — across clients, servers, and entire environments. This gives our customers superior visibility and control, which is essential for successful migration to PQC. 

 2. Fast Track to PQC Algorithms with Crypto Agility

Until recently, classical encryption algorithms were considered sufficient for protecting sensitive or critical information. But with quantum computing advancing rapidly, we’re now entering an era where products and systems must be capable of algorithm agility — the ability to update cryptographic algorithms as needed. 

Our platform is designed with this crypto agility need in mind. From the beginning, we’ve emphasized the importance of managing cryptographic agility across complex environments, especially where SSH keys are involved. This isn’t just about replacing algorithms — it's about building infrastructure that can respond, evolve, and remain secure as threats change. 

3. Built-In Support for Algorithm Strengthening

Thanks to our deep collaboration with clients in the financial sector, we’ve already built the capability to renew SSH keys using stronger, updated algorithms. Our system allows you to enforce minimum algorithm strength and stay compliant with evolving cryptographic standards.  

That means you're not just reacting to threats — you're getting ahead of them. And upgrading your encryption is easy: all it takes is the push of a few buttons and you’re done. Provided of course you know what you are doing. Which bring us to… 

 

4. Quantum-Safe SSH Requires Deep Expertise

Quantum safety in SSH environments isn’t just about flipping a switch. Different SSH server types (OpenSSH, Tectia, SunSSH, etc.) support different algorithms depending on their versions. Beyond that, configuration files can enable or disable algorithms on a granular level.  

To assess quantum readiness, you need to correlate server versioning, configurations, and algorithm support — a level of detail only achievable through expertise and dedicated tooling. 

We specialize in exactly this: making sense of heterogeneous environments, connecting all the dots, and giving you a clear roadmap toward quantum safety in your SSH infrastructure. 


5. Securing applications or devices you cannot upgrade

Let’s face it. Customer environments host a lot of applications using various technologies that cannot be upgraded to PQC, and there’s no upgrade timeline available from many technology providers. It’s even worse for many operational technology (OT) environments where industrial control systems (ICS) simply cannot be upgraded due to physical limitations.  

The good news is that we can PQC-proof your most critical connections that transmit long-lived, high-value data. With our NQX solution, you can wrap access to these applications or connections between them inside a quantum-safe tunnel without touching the applications or ICSs.

Think of our quantum-safe solution NQX as a paramedic that instantly fixes your most urgent PQC needs and makes any connection quantum-safe, regardless of what type of data being transmitted – even if it travels over the open internet.  


6. The Challenge for Larger Organizations

For many small and medium-sized businesses and organisations, migration to PQC will be routine, as service and technology providers will deliver it as part of their normal upgrades. However, for some larger organisations, PQC will require planning and significant investment. 

This aligns with what we see in the field. Diverse environments, legacy systems, and varying encryption implementations make the PQC transition particularly complex for large enterprises. This is especially true when it comes to SSH, where fragmented key management often hides critical risks. 

That’s why we’ve chosen to specialize in helping customers manage the post-quantum transition from the SSH key perspective — offering a niche, high-value capability that’s increasingly in demand. 

 

Get Started with a Crypto Inventory and Risk Assessment 

Typically, our customer projects start with a cryptographic inventory and SSH risk analysis as a service, based on our long-standing SSH risk assessment called PrivX Insights. Whether you're just getting started or need an expert opinion on your current posture, our team is here to help. 

Is your organization ready for the post-quantum era? Get in touch to discuss how we can help you build resilience today — and confidence for tomorrow. 

 

Jani Virkkula

Currently employed by SSH.COM as Product Marketing Manager, Jani is a mixed-marketing artist with a strong background in operator and cybersecurity businesses. His career path of translator->-tech writer -> marketer allows him to draw inspiration from different sources and gives him a unique perspective on all types...

Other posts you might be interested in