Post-Quantum Encryption
for the AI Era
Pillar 2: The Iron-Clad Handshake
QuantumIQ Protocol with NIST Level 5 post-quantum encryption (ML-KEM-1024). Every client connection initiates an ephemeral post-quantum key exchange, protecting data from both current and future quantum threats. Data encrypted today remains secure even after quantum computers break RSA in 2030.
"Harvest Now, Decrypt Later"
This isn't theoretical. It's documented fact. Your AI data encrypted today could be completely exposed by 2035.
Harvest Now
Adversaries collect encrypted data today.
Store Until
Data is held until quantum computers mature.
Decrypt Later
Future computers break today's encryption.
NIST spent 8 years developing post-quantum standards precisely because of this threat. They finalized those standards in 2024. Most AI companies haven't implemented them.
The Ironclad-Shield Stack
Every layer is NIST-standardized with years of cryptographic review. Defense in depth means multiple locks, not just one.
Why Ironclad-Shield?
Standard encryption protects you today. Ironclad-Shield protects you forever.
* Comparison based on standard implementation of TLS 1.3 and AWS/GCP KMS without PQC extensions.
Technical Specifications
Built on NIST-standardized algorithms for maximum compliance.
Quantum Security
- ML-KEM-1024
- X25519 Hybrid
- SHAKE-256
Performance
- <1ms Keygen
- 0.4ms Overhead
- 95k+ RPS
Standards
- FIPS 203/204 PQC
- FIPS 140-3 HSM
- SOC 2 Type II
FIPS 140-3 validation in progress
How It Works
The Iron-Clad Handshake establishes a quantum-safe encrypted channel in milliseconds. Here's exactly what happens under the hood.
The Quantum-Safe Handshake
Client Key Generation
Client generates ephemeral ECDH key pair (P-256) and unique session ID
// Client generates key pairconst keyPair = await crypto.subtle.generateKey({ name: 'ECDH', namedCurve: 'P-256' },true,['deriveBits']);const sessionId = generateSessionId();
Ephemeral keys ensure forward secrecy - compromising one session doesn't compromise others.
End-to-End Encryption Flow
Quick Integration
// TypeScript SDK - Region-Aware Encryptionimport { RegionalIronclad } from '@prism/ironclad/regional';// Initialize with region detectionconst ironClad = new RegionalIronclad({apiKey: 'your-api-key',region: 'SA', // Explicit: Saudi Arabia// OR: countryCode: 'SA',// OR: autoDetect: true // Detect from browser timezone});// Get regional compliance infoconst info = ironClad.getRegionInfo();console.log(`Region: ${info.name}`); // "Saudi Arabia"console.log(`Bodies: ${info.regulatoryBodies}`); // ["NCA", "SAMA"]// Fetch server config (HSM required, data residency)const config = await ironClad.fetchConfig();console.log(`HSM: ${config.compliance.hsmRequired}`); // trueconsole.log(`Residency: ${config.compliance.dataResidency}`); // "SA"// Perform regional handshakeconst session = await ironClad.handshake(clientPublicKey);console.log(`Algorithm: ${session.algorithm}`);
Source Implementation
Frontend (TypeScript)
Browser-side encryption
src/lib/ironclad.tsSession management, ECDH key exchange, AES-256-GCM encryption
src/lib/ironclad/crypto.tsML-KEM-1024 encapsulation, X25519 hybrid, HKDF derivation
src/lib/ironclad/hsm.tsGCP Cloud KMS, FIPS 140-3 key storage
Backend (Python)
Server-side cryptography
utils/pqc_crypto.pyML-KEM-1024 + P-384 ECDH hybrid, HKDF-SHA256, liboqs integration
routes/pqc_handshake.pyPOST /api/v1/security/handshake, key rotation, compliance endpoints
IRONCLAD_ENCRYPTION_ARCHITECTURE.mdComplete system documentation, data flow diagrams
Algorithm Stack (NIST Compliant)
CRYSTALS-Dilithium (ML-DSA) SignaturesIMPLEMENTED
Post-quantum digital signatures for data integrity and non-repudiation
PRISM implements hybrid ECDSA P-384 + ML-DSA-65 signatures for FIPS compliance and post-quantum protection. Both signatures must verify for maximum security.
Signing API
POST /api/v1/security/sign
{
"data": "<base64_message>",
"key_id": "sig-key-...",
"use_hybrid": true
}
Response:
{
"signatures": {
"ecdsa_p384": {
"signature_b64": "...",
"algorithm": "ECDSA-P384-SHA384",
"fips_compliant": true
},
"ml_dsa": {
"signature_b64": "...",
"algorithm": "ML-DSA-65",
"fips_204_compliant": true,
"post_quantum": true
}
},
"hybrid": true
}Verification API
POST /api/v1/security/verify
{
"data": "<base64_message>",
"signature_envelope": { ... },
"public_keys": { ... }
}
Response:
{
"valid": true,
"verifications": {
"ecdsa_p384": { "valid": true },
"ml_dsa": {
"valid": true,
"algorithm": "ML-DSA-65",
"post_quantum": true
}
},
"hybrid_verified": true
}Regional Library Support
AWS-LC, BoringSSL
FIPS 203/204 compliant
BSI/ANSSI hybrid mode
GDPR compliant
JCMVP (Japan)
Regional standards
NCA/SAMA (Saudi), NESA (UAE)
Data residency options
FIPS 140-3 Certification: Ironclad-Shield is currently undergoing FIPS 140-3 validation through the NIST Cryptographic Module Validation Program (CMVP). Our implementation uses FIPS-approved algorithms (ML-KEM-1024, ML-DSA, AES-256-GCM) and hardware security modules (HSM) that meet FIPS 140-2 Level 3 requirements. Certification is expected in Q2 2026.
Post-Quantum Encryption Plans
Choose the right level of quantum-safe protection for your infrastructure
Defense
For production applications
- 100,000 encryptions/month
- Full 5-layer stack
- Priority Email support
- 99.9% SLA
- Audit logs
Armory
High-volume scale
- 1,000,000 encryptions
- Dedicated HSM slots
- 24/7 Phone support
- Advanced Rotation
- Custom retention
Need Sovereign Deployment?
For on-premise HSM, custom contracts, and unlimited volume.
Frequently Asked Questions
Everything you need to know about Ironclad-Shield and post-quantum encryption.
Still have questions? Contact our team
Ready for Quantum-Safe Security?
Start protecting your data today. Get API access in minutes, or talk to our team about enterprise solutions.