Softforum's quantum-resistant cryptography platform is an effective countermeasure against the incapacitation of existing public key cryptography (RSA, ECC, etc.) algorithms, and is a security solution that should be applied quickly in the future. We are continuously upgrading to strengthen security through planning, development, verification, and commercialization processes in order to prepare for the quantum computer era that is just around the corner and to respond to possible security risks.
Provides encryption function for data stored in the host and data transmitted and received through the network using various encryption algorithm technologies, and develops and supplies authentication software by encrypting the user's knowledge, unique information, physiological characteristics, and body behavior .
Business processes for responding to the transition to next-generation quantum-resistance cryptography should generally consider:
Identification and classification of cryptographic algorithms used within the enterprise (binary, process, network-based search and public key password detection)
When the conversion target list is confirmed, the hybrid method of the existing public key and quantum resistant cryptography is applied.
Refer to the PQC transition schedule (JPMorgan Chase & Co.)
Challenges with Crypto Agility (JPMorgan Chase & Co.)
Migrating from the current set of public-key algorithms to post-quantum algorithms requires first identifying where and for what purpose public-key cryptography is being used. Public key cryptography is integrated into existing computer and communications hardware, operating systems, applications, communications protocols, key infrastructures, and access control mechanisms.
Digital signatures used to provide authentication of origin and integrity, and to support non-repudiation of messages, documents, or stored data.
An identification process used to establish an authenticated communication session or authorization to perform a specific task
Transmission of symmetric keys (e.g. key wrapping, data encryption and message authentication keys) and other key material (e.g. initialization vectors)
Specific authorization process
Replacing an algorithm typically involves: 1) cryptographic libraries, 2) implementation validation tools, 3) hardware that implements or accelerates algorithm performance, 4) dependent operating system and application code, 5) communication devices and protocols, and 6) user and Control procedures must be changed or replaced. 7) Security standards, procedures, and best practice documents should be changed or replaced, as are installation, configuration, and management documents. 8) If you decide to replace the algorithm, you should develop a playbook that takes all of these factors into account. Some elements of the playbook depend on the algorithm being substituted and the nature of the substituted algorithm.
Migration of current use of public-key cryptography from classical to post-quantum algorithms may involve a multi-step process with intervening steps such as the utilization of hybrid algorithms (a combination of classical quantum fragility and quantum-resistance public-key algorithms). When requirements are defined early enough, they can be incorporated into the standards development and coordination process and into the process of developing implementation guidelines, recommendations, and protocols. If not currently underway, initial discovery efforts should begin as soon as possible.