The quantum computer represents a major technological advance that could ultimately compromise traditional encryption systems. Asymmetric algorithms such as RSA and ECC, which are widely used today, will be vulnerable to the future computing capabilities of CRQCs (Cryptographically Relevant Quantum Computers). This threat is not just for the future, as attackers are already adopting certain methods to intercept and store encrypted communications, with the intention of decrypting them later.
To counter this threat, it is essential to adopt robust and scalable security solutions that can withstand today’s and tomorrow’s attacks. This is why ERCOM Cryptosmart is positioned as an essential protection for endpoints, data and communications. The solution incorporates hybrid encryption techniques combining proven technologies and robust post-quantum algorithms. Read this article to find out how Cryptosmart Mobile's progressive approach enables organisations to protect their communications now, while ensuring a smooth transition to the security standards of tomorrow.
Mobile communications security is facing increasingly sophisticated threats, among which quantum attacks stand at a key position. There are a number of real threats:
If the sum of X + Y is greater than Z, then the organisation is at risk: it could see its data compromised if it does not begin its transition in time. This is why acting now is vital.
Cryptosmart Mobile takes a hybrid and crypto-agile post-quantum approach. The solution incorporates techniques to combine several cryptographic building blocks, both conventional and post-quantum. Also, it can be adapted over time as standards, performance, and vulnerabilities evolve.
Crypto-agility is the ability for a system to rapidly integrate new algorithms or replace older ones, without jeopardising the overall architecture or disrupting users. This is an essential approach in a context where post-quantum algorithms, although promising, are still in their infancy and may be called into question in the years to come.
Integrated technologies include:
Only Falcon, although selected, remains a draft to this day under the future FIPS 206: FN-DSA.
At the same time, FrodoKEM, an algorithm supported by ANSSI and BSI, is in the process of being standardised at the ISO level. Its mathematical robustness and alignment with certain European requirements make it a strategic alternative, further illustrating the importance of an open, modular, and scalable architecture.
Cryptosmart Mobile is today the only sovereign solution capable of encrypting voice communications using post-quantum cryptography. This unique capability has been demonstrated in a number of trials carried out since 2021, including the first PQC-secured telephone calls. These advances prove that the solution is not prospective, but already operational in the field to meet future requirements.
To ensure effective protection against quantum threats, a post-quantum mobile security solution must meet several key requirements:
o Certification and validation by trusted organisations such as ANSSI ensure compliance with the highest security standards.
o ERCOM is committed to offering security solutions that respect its customers' digital sovereignty.
With its proven expertise and advanced technological approach, ERCOM offers a three-step migration strategy:
The transition to post-quantum cryptography is based on a controlled approach:
Conclusion
Cryptosmart Mobile is the complete solution for protecting your mobile communications against quantum threats, now and in the future. With its features, it offers durable and future-proof protection, evolving with threats and keeping you one step ahead. Don't let quantum threats compromise the security of your communications. Contact ERCOM today and request an appointment to deploy your post-quantum mobile security solution with Cryptosmart Mobile.