Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Post-Quantum Security

Embracing post-quantum cryptography for quantum-proof security

What is post-quantum cryptography (PQC)?

Post-quantum cryptography, PQC consists in all cryptographic methods that withstand a quantum computer. Nearby on the computing horizon there will be quantum computers capable of factorizing large prime number products and solving the discrete logarithm problem.
This will enable quantum computing to break the existing asymmetric cryptography methods currently used to secure our data (RSA, ECC and Diffie-Hellman), and thus put at great risk the way we do and secure digital business.

Get your PQC Migration Guide

To follow or contact us:
Linkedin | Twitter

Get quantum-ready today, to achieve quantum-proof tomorrow

Atos helps you benefit from quantum computing, while also anticipating the threats it creates towards your cybersecurity, by preparing and planning your migration to post-quantum cryptography.

To migrate to PQC smoothly and effectively, you can leverage and benefit from our full set of crypto-agile products to secure your perimeter: from generating secure key pairs to deploying them through a PKI to using them in tokens and applications to secure your network and data. By supporting you in deploying crypto-agile solutions, we ensure an easy switch between cryptographic methods including new quantum safe ones. For now, most authorities recommend an hybrid approach adding a quantum-proof layer of security on top of the current traditional cryptographic protocols already in use. This ensures that if one layer is broken the second one remains. Adopting hybrid security now also protects all your assets from being stored and decrypted later on, once quantum computers become available to attackers.

The rise of quantum computing implies that staff will have to be trained on PQC topics and technologies.

Atos supports organizations in understanding and adopting this technology thanks to top experts in the field of both quantum computing and PQC.

Achieve end-to-end crypto agility with our quantum-ready products and experts

Cybersecurity-Data-Protection-p

End to end crypto-agile product range

IDnomic PKI, Greenshield Email and File encryption, Evidian IAM suite, and Trustway HSM and VPN appliances

Cybersecurity-Cloud-access-management-r

PQC migration consulting and integration

Helping customers raise internal awareness, prepare a migration plan, secure executive sponsorships and budgets, and implement the program, like building their crypto inventory, managing their partners and vendors, migrating their devices, systems and applications.

Atos QLM

The world highest-performance quantum emulator


Atos myQLM

A python package provided with open-source interoperability connectors

Given the extensive impact, a holistic solution is imperative

In your organization, PQC will impact every asset, device or protocol using encryption, creating challenges in:

  • Certificate management in a PQC-ready PKI
  • PQC-readiness of your apps, systems and devices
  • PQC encryption keys generation and management as well as post quantum cryptographic operations in next-generation HSM and VPN appliances
  • PQC-ready smartcards, tokens and chips
  • Maintain authentication with digital signatures
  • Identify and secure long shelf-life data and transactions, to prevent harms from store now-decrypt later type of cyber attacks
  • Post-quantum security protocols on your networks, systems and application

Secure and protect your sensitive data, assets and devices with our full range of crypto-agile solutions:

  • Crypto agile & post-quantum ready
  • On premise and as a service offerings available
  • Worldwide presence and support
  • Highly certified and qualified by French and German authorities, as well as European Union and NATO, up to EU-Restricted and NATO-secret for our HSMs
  • Full range of technology partnerships to complete our offerings
  • Industrialized but adaptable Cybersecurity services, including consulting, audit, integration and managed services

Our full range of quantum-ready cybersecurity products enable you to manage your Trusted Digital Identities and Data Protection:

Evidian IAM suite – for handling your cloud/Web single sign one with a PQC ready Identity Provider

IDnomic PKI – generating and managing hybrid certificates PQC ready for legacy as well as PQC ready applications enabling a smooth migration path for its users

Cryptovision Greenshield for email and file encryption – using PQC algorithms to protect your emails content and allowing seamless usage of traditional algorithms as well as future quantum resistant ones

Trustway Proteccio HSM – for PQC ready encryption keys generation and storage as well as sensitive post-quantum and hybrid cryptographic operations

Trustway IP Protect VPN – protecting confidentiality and integrity of your data in transit over untrusted networks leveraging hybrid and PQC methods

Related resources

EVIDEN-cybersecurity-PQC-Migration-Guide-The-essentials-Front-cover

Guide

PQC Migration guide >>

The essentials for your step-by-step migration to PQC gathered in a comprehensive guide.

Atos cybersecurity cryptovision-Post-Quantum-Whitepaper-EN

White paper

An introduction to Post-Quantum Cryptography >>

All the basics you need to know about Post-Quantum Cryptography, in an understandable way.

Cybersecurity Trustway - Paper - Post Quantum Cryptography

White paper

Trustway R&D and the Post-Quantum Cryptography >>

An overview of PQC and the NIST contest organized to define the future standards of the PQC.

Cybersecurity Trustway - Paper - Hybridation Cryptography

White paper

Trustway: A cryptographic hybridization to ideally prepare for post-quantum migration >>

How to start deploying hybrid cryptography – traditional and post-quantum – to easy your migration to PQC.
(Caveat : the mentioned SIKE algorithm was broken end of July 2022, after publication of this paper)

Interested in going further? You can schedule a call with our experts.