Skip to main content


Quantum Key Distribution (QKD)

The privacy and integrity of communication relies on secret keys. Key-establishment mechanisms use asymmetrical ciphers and algorithms like RSA and Diffie-Hellman ...
Learn more

Post-quantum cryptography (PQC)

The computational power of emerging quantum computers poses a threat to many classical cryptographic systems. Public key cryptography and signature algorithms that are currently in use are no longer secure ...
Learn more

Mission-critical networks

Information security is a major challenge for critical infrastructure and operators of essential services. Established protection mechanisms are increasingly at risk ...
Learn more

Secure cloud infrastructure

Increasing cyber risks pose a significant threat to critical infrastructures, public authorities and businesses. In this digital era, highly secure and efficient networks ...
Learn more

Layer 1 encryption

Fiber-based high-speed communication networks are crucial for essential services, governments and defense, as they transport huge amounts of mission-critical data ...
Learn more