Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
SafeLogic Announces CryptoComply PQ TLS Early Access Program
December 19, 2024 •Mike Donaldson
SafeLogic, Inc., a premier provider of cryptographic software solutions, announced today an Early Access Program (EAP) for the company’s newest product, CryptoComply PQ TLS. SafeLogic’s aim with this product is to help organizations in their Post-Quantum Cryptography (PQC) migration journey by enabling them to secure quantum-vulnerable TLS connections in a streamlined and crypto-agile way.
CryptoComply PQ TLS supports seven key capabilities SafeLogic believes will be essential for organizations as they pursue quantum resiliency:
Drop-In Replacement for OpenSSL 3.x Based TLS 1.3 Implementations
CryptoComply PQ TLS is a drop-in replacement for OpenSSL 3. x-based TLS 1.3 implementations, which are some of the most common TLS implementations in use today. With CryptoComply PQ TLS, TLS communications that use this technology stack can be made quantum-resilient in minutes.
Three Operating Modes Ensure Broad Interoperability
CryptoComply PQ TLS can operate in three modes: classical only, PQ/classical hybrid, and pure PQ. As organizations migrate to PQC, not all endpoints will migrate at the same pace. CryptoComply PQ TLS will negotiate with existing endpoints to find a common set of cryptographic algorithms to use to ensure interoperability in accordance with established security policy. It automatically uses classical-only mode to communicate with endpoints that are not yet PQ-enabled. The other two modes can be used when both sides support PQ-enabled TLS.
Pure PQ Mode Enables Quantum-Resilient TLS Now
Organizations controlling both sides of the TLS connection can use CryptoComply PQ TLS in each endpoint to implement quantum resilience. In addition, CryptoComply PQ TLS Pure PQ mode works with other quantum-resilient endpoints. For example, SafeLogic has demonstrated a CryptoComply PQ TLS endpoint supporting PQ-enabled TLS with Apache and Nginx web servers.
Hybrid Mode Enables Defense in Depth and FIPS 140-3 Compliance
Organizations may choose the hybrid mode for reasons such as defense in depth or a desire to achieve quantum readiness while also maintaining FIPS 140 compliance. To achieve the latter in hybrid mode, CryptoComply PQ TLSleverages SafeLogic’s FIPS 140-3 validated implementations of classical algorithms. This ability to satisfy both PQC and FIPS 140 requirements is key for most products destined for the public sector, where FIPS 140-validated cryptography is required to protect federal data in transit.
Superior Performance
Performance was a key design and implementation consideration for CryptoComply PQ TLS. A pure PQ TLS handshake is 20% faster than one using classical cryptography, while hybrid mode only adds roughly 15% overhead to a classical TLS handshake.
Commercial Grade Implementation of NIST Standard ML-KEM (FIPS 203)
CryptoComply PQ TLS uses SafeLogic’s implementation of ML-KEM (FIPS 203) to add quantum resilience to the TLS handshake. A robust commercial-grade implementation of ML-KEM was a key prerequisite, as many of the existing (e.g., open-source) implementations of the ML-KEM algorithm were not production-ready code. SafeLogic is currently working to secure NIST Cryptographic Algorithm Validation Program (CAVP) certification for its ML-KEM implementation.
Policy-Driven Crypto-Agility:
CryptoComply PQ TLS takes policy policy-driven approach to crypto-agility. DevSecOps teams can follow mandates from compliance and security to declaratively configure allowed algorithms as part of a security policy. CryptoComply PQ TLS will then follow that defined policy at runtime, with no code changes needed to software at any of the endpoints.
“Organizations starting their PQC migration journeys are often faced with the challenge of prioritizing these migration efforts. Focusing on securing TLS connections is often low-hanging fruit that offers the largest bang for the buck to protect data in transit from harvest now decrypt later (HNDL) types of attacks. With CryptoComply PQ TLS, securing these quantum vulnerable TLS connections can be done quickly without requiring broader infrastructure changes,” said Evgeny Gervis, SafeLogic CEO.
Earlier this year, at the RSA conference, SafeLogic announced an Early Access Program (EAP) for its next-generation CryptoComply module, which supports all the PQC algorithms recently standardized by NIST. SafeLogic has also been collaborating with NIST and other leading organizations as part of NIST’s National Cybersecurity Center of Excellence (NCCoE) PQC initiative, where it leads the PQC Risk Management and Migration Prioritization workstream.
Existing SafeLogic customers are welcome to participate in the CryptoComply PQ TLS EAP and test the new software at no cost. For more information, they should contact their existing SafeLogic representative or sales@safelogic.com.
Mike Donaldson
Mike is the CMO at SafeLogic.
Popular Posts
Search for posts
Tags
- FIPS 140 (112)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (19)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- post-quantum cryptography (12)
- NSA (11)
- PQC (10)
- Cloud (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- OpenSSL 3.x (4)
- TLS 1.3 (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- POA&M (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)