TODAY’S ENCRYPTION IS OBSOLETE
Using Shor’s algorithm, Quantum computers will decrypt data encrypted with asymmetric algorithms (RSA, Elliptic Curve). Your data is no longer safe. Important long-life data is being stolen by bad actors today to be decrypted tomorrow (steal now, decrypt later attacks) when they get their hands on cryptographically relevant quantum computers.
PATERO FUTURE-SAFES YOUR DATA
Patero’s CryptoQoR™ is a highly efficient crypto-agile software that generates, hybridizes, and rotates session keys composed of quantum-resistant public-private key pairs using NIST post-quantum cryptography (PQC) and classic key encapsulation methods (KEM).
When CryptoQoR is deployed, it provides end-to-end, hybrid post-quantum encrypted communication channels leveraging kernel-based multithreaded encryption protocols. This high-performance, low-latency, quantum-resistant connectivity protects data in motion with selectable NIST PQC KEMs while retaining traditional encryption protection as a backstop, as the efficacy and resilience of quantum-resistant encryption evolve
CRYPTOGRAPHICALLY AGILE
Patero CryptoQoR is crypto-agnostic. It supports multiple NIST PQC algorithms and can be soft-updated with future algorithms as standards are issued. The product provides user-selectable algorithm choices (depending on the level of cryptographic security desired) and in situ addition or replacement of quantum-resistant algorithms without product recall, equipment replacement, or network interruption.
MULTIPLE TOPOLOGIES SUPPORTED
-
Point to Point - one-to-one channels transmitting sensitive, classified, or personal data. Example: MPLS replacement
-
Multipoint to Point (EDGE-to-Cloud) - communication from multiple assets and/or locations to a virtual private cloud or private cloud.
-
Multipoint to Point (on-premises) - communication from multiple assets to a central, on-premises server. Example: Video surveillance cameras to a camera server
CryptoQoR endpoints don't trust just any other network endpoint. They will ignore incoming requests – unless from another Patero-protected endpoint. Only trusted endpoints that present authentication – including quantum-algorithm key material, will be allowed to establish a quantum-safe channel.
Want to learn more?
Schedule a call?
Get started?
Send us a note!




