Quantum computers will, within the coming years, become powerful enough to break today’s widely used public-key (asymmetric) cryptography — RSA, DSA, ECC, DH, and others. This means:
- Sensitive data encrypted today may be intercepted and decrypted in the future (“harvest now, decrypt later”).
- Once current digital signatures and certificates lose their integrity, e-services, identity management, financial systems, and other critical infrastructures will be at risk.
Organizations must already plan a structured transition to post-quantum solutions, as by 2031 all high-risk systems relying on asymmetric cryptography will be required to use post-quantum algorithms (and by 2036 this requirement will extend to all other systems).
Our Offering
The Post-Quantum Cryptography Transition Service is a structured process aligned with the guidelines issued by the Ministry of National Defence of the Republic of Lithuania. It helps your organization to:
- Ensure the long-term protection of sensitive data in the era of quantum technologies.
- Reduce technological, regulatory, and reputational risks associated with vulnerabilities in classical algorithms.
- Comply with NIST, EU, and national requirements for phasing out classical algorithms and implementing PQC.
- Strengthen trust by having a clear, documented transition plan that can be presented to shareholders, clients, and supervisory authorities.
What You Receive in Practice
Cryptographic Inventory and Risk Assessment
- Identification of where and which algorithms/protocols are used (TLS/SSH, VPN, PKI, CA/X.509 certificates, applications, source code, artifacts, firmware signing, databases, logs, cloud environments, OT/IoT, etc.).
- Assessment of which components are most vulnerable to quantum threats and which should be migrated first.
Strategic Transition Plan
- Prioritized actions, phases, and timelines in accordance with NIST/EU schedules.
- Clear responsibilities, required resources, and dependencies on vendors.
Selection and Testing of Technological Solutions
- Selection of post-quantum and hybrid (classical + PQC) solutions tailored to your organizational environment.
- Comprehensive testing in a sandbox environment, evaluating compatibility, performance, stability, and security characteristics.
Gradual Deployment and Ongoing Support
- Deployment of pilot solutions, testing in real environments, and controlled rollout across the organization.
- Step-by-step replacement of classical cryptographic algorithms with hybrid, and ultimately fully post-quantum, solutions.
- Implementation of monitoring, incident management, and crypto-agility processes to ensure continuous protection and timely response to emerging threats.
The Post-Quantum Cryptography Transition Service is your path toward a secure future.