Post-Quantum Encryption

Noxy uses Kyber-based post-quantum encryption to ensure encrypted decision requests remain secure even against future quantum computing threats.

Post-Quantum Encryption
PQE Secure Quantum-Resistant Security
The Quantum Threat Current encryption methods (RSA, ECC) that secure most of the internet today will be vulnerable to quantum computers. While large-scale quantum computers don't exist yet, the threat is real and imminent. Organizations are already collecting encrypted data today with the intent to decrypt it once quantum computers become available—a strategy known as "harvest now, decrypt later.
How Kyber Encryption Works
Key Generation

1. Key Generation

Each user's device generates a Kyber public/private key pair resistant to quantum attacks.

Encapsulation

2. Encapsulation

Sender uses recipient's public key to create an encrypted shared secret and ciphertext.

Decapsulation

3. Decapsulation

Only the recipient can use their private key to extract the shared secret and decrypt the message.

Kyber Encryption PQE Check Messages encrypted on sender's device, decrypted only on recipient's device PQE Check Network nodes cannot read message contents PQE Check Perfect forward secrecy for every message
NIST Standardized PQE Check Kyber selected by NIST as primary post-quantum standard PQE Check Extensively peer-reviewed by cryptographers PQE Check Battle-tested in real-world implementations