DWDM experts
Over 20 years of experience in Layer 1 and DWDM networks - we know fiber optics down to the last detail.
In the future, quantum computers will be able to break encryptions such as RSA and Diffie-Hellman - in minutes rather than years. But the threat is already starting today: hackers are storing sensitive data in order to decrypt it later ("store now, decrypt later"). This is particularly critical for information with a long lifespan - such as health records, legal documents or official communications.
Add your content here.
Add your content here.
PQC update:Adtran FSP 3000R7 |
Quantum security software update for your FSP 3000R7 including the necessary licenses. This makes your existing infrastructure fit for the future - usually without replacing hardware.
Your advantages:
✔ Future-proof through PQC ✔ Use of existing PQC-capable hardware ✔ License-based activation |
Add your content here.
PQC update:Adtran FSP 3000C |
We make your FSP 3000C PQC-capable through targeted software and configuration adaptations. This ensures that your network security remains guaranteed even in the post-quantum era.Hybridizationispossible by linking PQC with additional QKD keys.
Your advantages:
✔ PQC protection ✔ Usually no hardware changes necessary ✔ Customized adaptation |
Add your content here.
PQC update:Managed service |
If you have your systems operated and managed by us, we will ensure the continuous PQC security of your connections. This applies to the use of all Adtran FSP 3000 systems.
Your advantages:
✔ All-round carefree package ✔ Proactive security updates ✔ Monitoring & support included |
Add your content here.
They prevent tapped data from being decoded later ("store, nowe, decrypt later").
Add your content here.
You comply with current and upcoming security guidelines.
Add your content here.
You demonstrate your security expertise to customers and partners.
Add your content here.
Open for the future with QKD
Add your content here.
Thanks to a quantum-safe basis, you save on subsequent migrations.
Add your content here.
Experienced specialists implement the solution - on site or remotely.
Add your content here.
David Haas advises companies, authorities and critical infrastructures on IT security, compliance and post-quantum cryptography. If you want to know when and how you should prepare for the post-quantum era - talk to him!
Visit us at the dacoso CBC in Langen near Frankfurt and experience quantum security up close. We will show you live how post-quantum cryptography is already making your IT infrastructure future-proof today.
i
Over 20 years of experience in Layer 1 and DWDM networks - we know fiber optics down to the last detail.
Early specialization in encryption - directly where data is created: on the fiber.
Renowned companies, banks, carriers and authorities have been relying on our solutions for more than two decades.
From 12 locations in DACH, our service technicians are always quickly on site. Decentralized spare parts warehouses also ensure fast recovery.
We are actively involved in major research projects on quantum-safe communication - and apply this knowledge directly to your solution.
Together with top players in the industry, we set quantum-safe standards for tomorrow.
Quantum computers use quantum bits (qubits) which, unlike classical bits, can be not only 0 or 1, but also superpositions of these states. This allows them to follow many computing paths simultaneously. They are exponentially faster than conventional computers, particularly for certain mathematical problems - such as factoring large numbers.
Quantum computers can solve certain mathematical problems much faster than classical computers. A particularly important algorithm for this is the Shor algorithm, which was developed by mathematician Peter Shor in 1994. This algorithm can solve two central problems extremely efficiently:
- Factorization of large numbers - this is the basis of the RSA encryption method.
- Calculating discrete logarithms - this is the basis for methods such as ECC (Elliptic Curve Cryptography) and Diffie-Hellman
Classical computers need an extremely long time for these tasks - often years or even decades for very large numbers. A powerful quantum computer could solve the same tasks in minutes or hours.
Post-quantum cryptography (PQC) refers to a new generation of cryptographic methods that will still be secure when powerful quantum computers become available. These methods are intended to replace today's widely used asymmetric algorithms such as RSA or Diffie-Hellman, which could be broken by quantum algorithms - in particular the Shor algorithm - in the future.
PQC is based on mathematical problems that are considered difficult to solve even for quantum computers. These include, among others:
- Lattice problems (e.g. Learning With Errors)
- hash-based methods
- multivariate systems of equations
- Code-based cryptography
The aim of PQC is to ensure cryptographic security even in a world with quantum computers - preferably without specialized hardware, i.e. purely software-based and compatible with today's IT systems.
Crypto-agility means that a system can flexibly integrate new cryptographic processes without having to rebuild the entire infrastructure. It is crucial in order to be able to react quickly to new threats - such as advances in quantum computing technology.
This depends on your industry, your data retention period and your risk assessment. Regulators such as the EU (DORA, Roadmap 2030) and the BSI recommend that you start preparing now - for example with crypto inventories, migration strategies and crypto-agile architectures. Companies with long-term sensitive data, e.g. in the financial, healthcare or public sectors, are particularly affected.