Platform Architecture

End-to-End Protection Across Three Critical Domains

Core Technology

Cryptographic Foundation

Classic McEliece

Our flagship cryptographic algorithm, Classic McEliece, is a NIST Round 4 finalist in the code-based category. After merging our original NTS-KEM submission with the initiative led by Professor Daniel Bernstein, it has undergone rigorous cryptanalysis by the global cryptographic community.

Classic McEliece deliberately introduces errors into the encryption process, with outputs that are "never the same." This approach means quantum computers have no pattern to exploit when attempting brute-force attacks.

  • 47-Year Security Track Record

    Minimal attack progress despite decades of cryptanalysis

  • Conservative Parameter Selection

    Prioritising security over novelty

RFC9370 - Hybrid VPN Standard

As the author of RFC9370, we established the IETF standard for multiple key exchanges in IKEv2. This specification enables hybrid post-quantum VPN connectivity.

Standard Significance: RFC9370 solves a critical interoperability challenge: enabling parties using different post-quantum algorithms to communicate securely.

Platform Principles

Built for Real-World Deployment

Interoperability

Solutions work seamlessly with existing systems and partners using different encryption standards. RFC9370 enables secure communications regardless of which quantum-safe algorithms partners have deployed.

Backward Compatible

Integration with legacy infrastructure proceeds without disrupting operations. Our hybrid approach allows classical and quantum-resistant encryption to operate simultaneously.

Crypto-Agile

Modular architecture enables rapid updates as cryptographic standards evolve. Organisations avoid rigid implementations that create vulnerabilities.

Production-Ready

Technologies deployed in operational environments, not laboratory experiments. From NATO networks to active conflict zones, our solutions perform where failure is not an option.

Modular Design

Implement components as needed and scale as requirements grow. Deploy identity protection, VPN security, or messaging encryption individually or in combination.

Defence-in-Depth

Hybrid methodology combines classical and post-quantum algorithms, ensuring security even if one cryptographic approach is compromised.

Ready to Secure Your Organisation?

Discuss your quantum security requirements with our experts. We provide tailored guidance for your transition planning.

Request Technical Consultation