Kryptus launches first portable device with Post Quantum Cryptography on the market

KeyGuardian is the first commercial handheld device on the global market to offer Post Quantum Cryptography (PQC) for data and communications sigil. 

Quantum computing is increasingly gaining ground not only in the media but also in the research and development of major companies and governments’ budgets.

No wonder: quantum theory enables old problems – such as medicine simulation and logistical mesh calculation – to be solved quickly and precisely using new classes of algorithms. In this way, the solution of “exponentially” difficult problems, when calculated with a quantum computer, moves into the field of solvable, i.e. polynomial complexity.

“However, precisely this paradigm shift allows the fundamental foundations of cryptography employed today to turn to dust: with quantum computers operating, the effort required to break algorithms such as RSA and Elliptic Curves leave the world of exponential difficulty (“millions of years”) for earthly efforts”, explains Dr. Roberto Gallo, CEO of KRYPTUS.

While quantum computers are not for everyone – and cryptographic threats are not yet practical – the fact remains that people, businesses, and governments mostly protect information for the future: a digitally signed contract must be guaranteed to be valid for years, a classified sensitive communication may have to be kept that way for decades. 

Furthermore, “many intelligence agencies are already collecting encrypted data to be read when the quantum computer is a reality, in an attack known as the Store-Now-Decrypt-Later (SNDL) attack,” according to Dr. Waldyr Benits, head of cryptology at the company.

Exactly, for this reason, regulatory bodies around the world, in particular the American NIST, have not only sought the algorithms standardization resistant to quantum computers (called Post Quantum Algorithms) but as recommended that organizations already have a clear transition plan of their systems at present.

Attuned to this movement, aligned with its historical leadership in innovation, Kryptus launched the new version of its crypto-portable KeyGuardian (KG) that now features full quantum computer resistance in both symmetric and asymmetric operations.

For symmetric operations, the KG supports PQC through both single sequence encryption (also called one-time pad – OTP) and the execution of symmetric block algorithms with keys up to 512 bits. For the asymmetric secrecy operation, the KG has an algorithm selected in the round 3 of PQC Standardization Process conducted by NIST.

With this, KeyGuardian becomes the first commercially available portable device in the global market to offer fullPost Quantum Protection (PQC) for data and communications confidentiality. 

Used by customers inside and outside Brazil, KG can be employed in multiple use cases, such as cipheringand signing documents, files, and folders, establishing VPNs,  file storage on-device through encrypted volume, and second-factor authentication. “With PQC, we see great potential for expanding the solution in the most diverse market segments,” concludes Gallo.

About Kryptus

KRYPTUS has invested for almost 20 years in cutting-edge cryptographic technology development, maintaining a team of cryptologists (experts in cryptography) for the study, evaluation, and development of solutions that are ahead of current and future cyber threats. It is the pioneer in the HSM market with its ASI-HSM line, the first to have its key lifecycle protocol peer-reviewed, the first to be certified ICP-Brazil, the first to obtain a double certification with FIPS-140, and the first to have the native KMIP interface. The kNET HSM is the newest member of this family: a high-performance multi-tenant device, prepared to meet the requirements for post-quantum evolution, offering natively symmetric cryptographic algorithms and the guarantee of a secure environment for its processing given by the international certification FIPS 140-2 Level 3.

More on OTP Cryptography:

One-Time Pad, or OTP, is an encryption technique in which each byte of plaintext data is combined with another byte of a truly random sequence (the OTP key stream) to produce the ciphertext. To decrypt a message, the other party must have an exact copy of the OTP pad to reverse the process. As the name implies, a disposable pad must be used only once and then destroyed. When applied correctly, OTP encryption provides a truly unbreakable cipher, backed by Information Theory. Its use is therefore highly recommended for military, diplomatic, and intelligence agency communications.

Originally described in 1882 by American banker Frank Miller, it was reinvented in 1917 by Gilbert Vernam and Joseph Mauborgne. Its name originates from the sheets of paper (pads) on which the key flow was usually printed. As the latest security technique, OTP encryption protects critical applications, such as the so-called “Red Phone”, which connects the White House to the Kremlin.


Our team is made up of the best professionals in the market: those who stand out for their expertise, agility, innovative thinking and technical capacity, valuing challenges and believing that it is possible to transform the world into a better place. If you fit this profile, please submit your resume or portfolio in the form below.



Valid Rss Rogers