The Quantum Threat
Quantum computers pose a fundamental threat to current encryption standards. Algorithms like RSA and elliptic curve cryptography (ECC) rely on mathematical problems that quantum computers can solve exponentially faster using Shor's algorithm.
Timeline
While large-scale quantum computers don't exist yet, the threat is real:
- "Harvest now, decrypt later" — Adversaries can store encrypted traffic today and decrypt it when quantum computers become available
- NIST estimates suggest cryptographically relevant quantum computers could arrive within 10-15 years
- Government agencies are already mandating post-quantum migration
Our Post-Quantum Strategy
RAMonly is preparing for the quantum era with a multi-layered approach:
1. Hybrid Key Exchange
We implement hybrid key exchange that combines:
- X25519 (classical) — proven, fast, well-understood
- ML-KEM (Kyber) — NIST's selected post-quantum KEM standard
Both must be broken for the session to be compromised.
2. Post-Quantum Signatures
Authentication uses hybrid signatures:
- Ed25519 (classical)
- ML-DSA (Dilithium) — NIST's selected post-quantum signature standard
3. Forward Secrecy
Every session generates unique ephemeral keys. Even if long-term keys are compromised, past sessions remain protected. Combined with our RAM-only architecture, session keys are physically destroyed when you disconnect.
Why This Matters Now
Even though quantum computers can't break encryption today, implementing post-quantum cryptography now ensures:
- Protection against harvest attacks — Traffic captured today stays safe
- Smooth migration — No rushed deployment when quantum computers arrive
- Compliance readiness — Meet upcoming government mandates early
Current Status
Our post-quantum implementation is in beta testing on select nodes. We plan to roll it out globally as the NIST standards are finalized and performance is optimized.