{"id":23001,"date":"2026-04-21T11:03:11","date_gmt":"2026-04-21T09:03:11","guid":{"rendered":"https:\/\/www.transparentedge.eu\/?page_id=23001"},"modified":"2026-04-21T11:03:16","modified_gmt":"2026-04-21T09:03:16","slug":"post-quantum-cryptography","status":"publish","type":"page","link":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/","title":{"rendered":"Post-quantum cryptography"},"content":{"rendered":"\r\n\r\n<section id=\"apertura-productos-sin-cuadro-14623\" class=\"apertura-productos-sin-cuadro apertura-productos-sin-cuadro\" >\r\n\t\t\t<div class=\"image-deco\" id=\"apr-cdn-image-deco\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/Frame_securizacion.svg\" alt=\"frame securizacion\" \/>\t\t<\/div>\r\n\t\t<div class=\"container\">\r\n\t\t<div class=\"inner\">\r\n\t\t\t\r\n\t\t\t<div class=\"row-card\" id=\"apr-cdn-row-card\">\r\n\t\t\t\t<div class=\"main-card ancho\">\r\n\t\t\t\t\t\t\t\t\t\t<h1>\r\n\t\t\t\t\t\t<p>Post-quantum cryptography<\/p>\n\t\t\t\t\t<\/h1>\r\n\t\t\t\t\t<div class=\"text\">\r\n\t\t\t\t\t\t<p>The encryption that protects communications between browsers, APIs, and origin servers today is based on algorithms such as RSA and Elliptic Curve Cryptography (ECC), which are secure for traditional computing but vulnerable to the development of large-scale quantum computers that will have enough power to break them.<\/p>\n<p>If your traffic is not protected with <strong>post-quantum cryptography<\/strong>, the confidentiality of those communications is already compromised in the long term.<\/p>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"wrapper-button\">\r\n\t\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/\"  class=\"button white-button with-arrow\">What is PQC?<\/a>\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"wrapp-image\" id=\"apr-cdn-img-1\">\r\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/fibras_opticas_flux_07.png\" alt=\"\" \/>\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"servicios-35639\" class=\"servicios servicios\"  >\r\n\t<span class=\"image-deco\"><\/span>\r\n\t<div class=\"full-container\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"wrapper wrapper__left\">\r\n\t\t\t\t<h2>Use <strong>case<\/strong>\n<\/h2>\r\n\t\t\t<\/div>\r\n\t\t\r\n\r\n            \r\n\t\t\t<div class=\"wrapper wrapper__right\">\r\n\t\t\t\t\r\n\r\n\t\t\t\t<div class=\"cards-container\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-wrapper\">\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"card-title\">\r\n\t\t\t\t\t\t\t\t\t\t\tThe problem:\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-text\"><p><strong>Harvest now, decrypt later (HNDL) <\/strong>attacks no longer require a quantum computer. A malicious actor can intercept and store encrypted traffic (API requests, authentication tokens, or sensitive data in transit) and wait until they have the computational power to decrypt it. For critical data with a long lifespan, such as financial information, medical records, or login credentials, this vulnerability is already present.<\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.nist.gov\/pqc\"><span style=\"font-weight: 400;\">National Institute of Standards and Technology<\/span><\/a><span style=\"font-weight: 400;\"> (NIST) published the first post-quantum cryptography standards in August 2024: ML-KEM for key agreements, and ML-DSA and SLH-DSA for digital signatures. It has also set 2030 as the deadline for deprecating RSA and ECC.<\/span><\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-wrapper\">\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"card-title\">\r\n\t\t\t\t\t\t\t\t\t\t\tTransparent Edge&#8217;s response:\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-text\"><p>Transparent Edge implements <strong>post-quantum encryption<\/strong> at the transport layer to secure communications between the user&#8217;s browser and your infrastructure, without requiring you to modify your origin servers or your application.<\/p>\n<p>Deployment of protection strategy:<\/p>\n<ul>\n<li><strong>Hybrid key exchange:<\/strong> Transparent Edge establishes the TLS 1.3 handshake using ML-KEM in combination with classic ECDHE. The session key is derived from the most secure algorithm supported by the client, ensuring a secure connection without breaking compatibility with older devices.<\/li>\n<li><strong>Edge-to-browser coverage:<\/strong>PQC encryption is applied to the connection between the client (browser) and the Transparent Edge edge, which is the segment most exposed to traffic capture.<\/li>\n<li><strong>No changes to the origin server:<\/strong> Transparent Edge acts as a TLS proxy. Your origin does not need native ML-KEM support for client-edge traffic to be protected.<\/li>\n<li><strong>Default activation:<\/strong> PQC protection is enabled without additional configuration, following the same principle that has guided the adoption of TLS in the industry: security by default is the only way to protect infrastructure at scale.<\/li>\n<li><strong>Compatibility with major browsers:<\/strong> Chrome, Firefox, and Edge already support ML-KEM, which means that the percentage of actual traffic protected is significant. desde el primer d\u00eda.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n           \r\n\r\n\t\t<\/div>\t\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"tarjetas-icono-titulo-3863\" class=\"tarjetas-icono-titulo\" >\r\n\t<div class=\"full-container\">\r\n\t\t<div class=\"container\">\r\n\t\t\t\t\t\t\t<div class=\"cards grid-to-slider-mobile\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/TE_aqua_icono_54_3x-150x150.png\" alt=\"hacker\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>Protection against HNDL<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>It ensures that data intercepted today remains unreadable to future quantum decryption capabilities.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/08\/TE_aqua_icono_60_3x-150x150.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>Frictionless operation<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>It does not require dedicated physical connectivity between client and server. PQC runs on the existing network infrastructure without the need for specialized hardware. The performance impact is minimal, even on short-lived TLS connections.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/03\/TE_aqua_icono_41_3x-150x150.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>Early regulatory compliance<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>Alignment with future guidelines from organizations like NIST and government agencies that already require quantum migration plans. Adopting ML-KEM now positions your infrastructure to meet the requirements that will be mandatory in the coming years.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\r\n\r\n\t\t\t\t\t\t\t<div class=\"wrapper-button\">\r\n\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/contact\/\"  class=\"button with-arrow\">Talk to an expert<\/a>\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\t\r\n\t<\/div>\r\n\t\r\n<\/section>\n\n\r\n\r\n<section id=\"certificados-46095\" class=\"certificados certificados\">\r\n\r\n    <div class=\"decor-1\">\r\n        <img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/themes\/transparent-edge-new\/assets\/img\/decorative-security_1.svg\"  alt=\"\">\r\n    <\/div>\r\n\r\n\t<div class=\"container\">\r\n\t\t<div class=\"inner-certificados\">\r\n\t\t\t<div class=\"header-title\">\r\n\t\t\t\t<h2>\r\n\t\t\t\t\tWhat does Transparent Edge offer <strong>to encourage PQC adoption<\/strong>?\n\t\t\t\t<\/h2>\r\n\t\t\t\t\r\n\t\t\t<\/div>\r\n                            <div class=\"wrapp-certificados\">\r\n                                            <div class=\"certificado\">\r\n                            <div class=\"wrapp-image\">\r\n                                                            <\/div>\r\n                            <div class=\"title\">\r\n                                Advanced protection layer                            <\/div>\r\n                            <div class=\"wrapp-text\">\r\n                            <p>Our clients gain an advanced layer of protection <strong>without impacting the operation of their services.<\/strong> By delegating encryption management to our distributed network, clients avoid the technical complexity of reconfiguring their origin servers or updating critical cryptographic libraries.<\/p>\n<p><span style=\"font-weight: 400;\">La ventaja principal es la garant\u00eda de que sus activos digitales y la privacidad de sus usuarios est\u00e1n protegidos contra la obsolescencia tecnol\u00f3gica de los sistemas de cifrado actuales.<\/span><\/p>\n                            <\/div>\r\n                        <\/div>\r\n                                            <div class=\"certificado\">\r\n                            <div class=\"wrapp-image\">\r\n                                                            <\/div>\r\n                            <div class=\"title\">\r\n                                How is it activated and what is the cost?                            <\/div>\r\n                            <div class=\"wrapp-text\">\r\n                            <p>Post-quantum cryptography support is enabled by default for all traffic using TLS 1.3 and compatible browsers (such as recent versions of Chrome, Firefox, or Edge). No manual intervention or additional configuration is required. This functionality is integrated as a security standard across all our services, so there is no additional cost.<\/p>\n                            <\/div>\r\n                        <\/div>\r\n                                    <\/div>\r\n            \t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\n<section id=\"destacado-texto-boton-95350\" class=\"destacado-texto-boton destacado-texto-boton big\">\n\t<div class=\"full-container\">\n\t\t<div class=\"inner\">\n\t\t\t<div class=\"text\">\n\t\t\t\t<p>Do you want to know how Transparent Edge manages this transition for your infrastructure?<\/p>\n\n\t\t\t\t\t\t\t\t\t<div class=\"wrapper-button\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/contact\/\"  class=\"button with-arrow\">Write to us now<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":18,"featured_media":22747,"parent":22406,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-23001","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Post-quantum cryptography - Transparent Edge<\/title>\n<meta name=\"description\" content=\"Post-quantum encryption at the transport layer to secure communications between the user&#039;s browser and your infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Post-quantum cryptography - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"Post-quantum encryption at the transport layer to secure communications between the user&#039;s browser and your infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-21T09:03:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/10\/cibersecurity_02-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1376\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/\",\"name\":\"Post-quantum cryptography - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cibersecurity_02-1.png\",\"datePublished\":\"2026-04-21T09:03:11+00:00\",\"dateModified\":\"2026-04-21T09:03:16+00:00\",\"description\":\"Post-quantum encryption at the transport layer to secure communications between the user's browser and your infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cibersecurity_02-1.png\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cibersecurity_02-1.png\",\"width\":1376,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/post-quantum-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Use cases\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/solutions\\\/use-cases\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Post-quantum cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Post-quantum cryptography - Transparent Edge","description":"Post-quantum encryption at the transport layer to secure communications between the user's browser and your infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"Post-quantum cryptography - Transparent Edge","og_description":"Post-quantum encryption at the transport layer to secure communications between the user's browser and your infrastructure.","og_url":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/","og_site_name":"Transparent Edge","article_modified_time":"2026-04-21T09:03:16+00:00","og_image":[{"width":1376,"height":768,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/10\/cibersecurity_02-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/","url":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/","name":"Post-quantum cryptography - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/10\/cibersecurity_02-1.png","datePublished":"2026-04-21T09:03:11+00:00","dateModified":"2026-04-21T09:03:16+00:00","description":"Post-quantum encryption at the transport layer to secure communications between the user's browser and your infrastructure.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/10\/cibersecurity_02-1.png","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/10\/cibersecurity_02-1.png","width":1376,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/post-quantum-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.transparentedge.eu\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"Use cases","item":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/"},{"@type":"ListItem","position":4,"name":"Post-quantum cryptography"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/23001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=23001"}],"version-history":[{"count":6,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/23001\/revisions"}],"predecessor-version":[{"id":23007,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/23001\/revisions\/23007"}],"up":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/22406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/22747"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=23001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}