SSH Quantum Security
PROTECT DATA WITH LONG-LASTING VALUE
Prevent the encryption of captured data being broken when quantum computers are efficient enough to do so.
Unbreakable data transmissions
Transmit critical data protected end-to-end by ultra-secure post-quantum and quantum-safe cryptography.
from trailblazers in cryptography
We are the Finnish information security company behind the Secure Shell protocol and pioneers in post-quantum encryption.
Quantum security is important to your organization right now
“Regardless of whether we can estimate the exact time of the arrival of the quantum computing era, we must begin now to prepare our information security systems to be able to resist quantum computing.” - National Institute of Standards and Technology (NIST)
“The rapid progress of quantum computing suggests the potential for adversaries of the United States to steal sensitive encrypted data today using classical computers, and wait until sufficiently powerful quantum systems are available to decrypt it. [...] a strategy for the migration of information technology systems of the Federal Government to post-quantum cryptography is needed.” - Quantum Computing Cybersecurity Preparedness Act, the US Congress
Quantum computers already exist and their power is increasing. Soon, they will reach the point where classical cryptography is in danger.
With more sophisticated quantum computing technology, all data encrypted with classic encryption is vulnerable. Encrypted traffic is already being captured and recorded - eventually, it will be possible to unlock the traffic when large-scale quantum computers will exist.
Organizations need to start their journey toward quantum security now. Quantum-safe cryptography (QSC) and post-quantum cryptography (PQC) are the backbones of quantum security.
Quantum Security: The last line of defense
Some information has long-standing value and is particularly vulnerable to the quantum threat. Examples include information like:
- Governmental: Diplomatic correspondence, national secrets
- Financial: Account Numbers, Credit card numbers (PAN’s)
- Personal: Social security ID / personal ID codes, health information
- Military: Weapon technology, blueprints, operations
- Medical: Medical history, psychotherapy transcripts
If these secrets are not protected with quantum security now or in the near future, what are the potential consequences?
- Financial losses
- Reputation disaster; loss of trust
- Decreased defensive capacity
- Mental distress
- Potential extortion
- Heavy fines (GDPR, PCI-DSS, HIPAA etc.)
- Personal accountability
quantum security against tomorrow's threats
Take the quantum leap to secure your organization
Going quantum-safe takes time
It took almost two decades to deploy the backbone of our classic security; the public key cryptography (PKC) infrastructure. Migration to quantum safe cryptography will take time. Start now.
Power up your classic cryptography game
Assess your current state of cryptography and take the required actions to improve your classic cryptography posture while migrating to QSC. For example, are you managing your SSH encryption keys as well as you should?
Upgrade to quantum-safe algorithms
Legacy encryption algorithms are secure and reliable – until relevant quantum computers arrive. Upgrade your critical systems with quantum-safe algorithms that enable ultra-secure communications for sensitive and secret data, whether quantum computers arrive sooner or later.
Experts can help you
We at SSH are pioneers in encrypting critical communications with over 25 years in business. We've been incorporating quantum security into our solutions for years and are leading initiatives like the post quantum cryptography focused PQC Finland project.
Quantum security resources