Fredericksburg, VA — March 04, 2025
Tychon, a leader in cryptographic security and automation, is proud to announce that it is collaborating with the National Cybersecurity Center of Excellence (NCCoE) in the Migration to Post-Quantum Cryptography Project Consortium. This collaboration will bring greater awareness to the issues involved in migrating to post-quantum algorithms and to develop practices to ease migration. As a member, Tychon has signed a Cooperative Research and Development Agreement to contribute its deep expertise in cryptography and unique processes and technologies for Automated Cryptographic Discovery and Inventory (ACDI).
The advent of quantum computing technology will compromise many of the current cryptographic algorithms, especially public-key algorithms, which are widely used to protect digital information. Most algorithms on which we depend are used worldwide in components of many different communications, processing, and storage systems. Practical quantum computing, when available to cyber adversaries, will break the security of nearly all modern public-key cryptographic systems.
It is essential that organizations begin planning now for replacement of hardware, software, and services that use public-key algorithms in order to protect information from future attacks. William (Bill) Newhouse, Security Engineer, NIST NCCoE stated, “Public-key cryptography is widely used to protect today’s digital information. With the advent of quantum computing, and its potential to compromise many of the current cryptographic algorithms, it is critical that organizations begin to plan for many of the technological and operational challenges that a migration to post-quantum cryptography will present. This project aims to help organizations in that effort.”
What are some of the challenges with the migration to post-quantum cryptography?
Organizations are often unaware of the breadth and scope of their application and functions that are dependent on public-key cryptography.
- Many, or most, of the cryptographic products, protocols, and services on which we depend will need to be altered when post-quantum replacements become available.
- Information systems are not typically designed to be agile and to support rapid adaptations of new cryptographic primitives and algorithms without making significant changes to the system’s components—requiring intense effort.
What is the goal for this project?
The initial scope of this project will engage industry to demonstrate the use of ACDI tools to identify instances of quantum-vulnerable public-key algorithm that are widely deployed and to manage associated risks. Other goals include development and improvement of migration strategy, interoperability and performance of implementations, and outreach to standard developing organizations and industry sectors.
About TYCHON Automated Cryptographic Discovery and Inventory (ACDI)
At the forefront of cryptographic security, Tychon’s ACDI platform provides organizations with automated discovery, analysis, and inventory of cryptographic assets across their IT environments. The powerful and efficient technology helps enterprises rapidly identify outdated or vulnerable cryptographic implementations, assess risk, and assist in prioritizing remediation and transition to quantum-resistant algorithms.
Tychon provides ACDI plug-ins for big data platforms such as Elastic and Splunk, enabling organizations to seamlessly integrate discovery and risk-scoring capabilities into their existing security workflows and continuous diagnostics and mitigation (CDM) tool suites. These integrations empower enterprises with real-time visibility and actionable intelligence to safeguard their sensitive data and infrastructure.
“Joining the NCCoE PQC Consortium reinforces our commitment to helping organizations prepare for the quantum era, especially our clients across the US Federal Government and Department of Defense,” said Eric P. Whittleton, President at Tychon. “Establishing a risk-scored cryptographic inventory does not need to be hard or expensive. We are excited to contribute our expertise and innovative data-centric approach to ACDI that will ultimately help enterprises transition to post-quantum security.”
Learn More
Additional information on this consortium can be found at https://www.nccoe.nist.gov/crypto-agility-considerations-migrating-post-quantum-cryptographic-algorithms
Tychon was founded by former U.S. Department of Defense cybersecurity experts with the mission to deliver actionable gold-source security and systems data at scale and in real time. For more information about Tychon and its work in cryptographic security, visit https://tychon.io.