Auspexi

Quantum‑Safe Readiness: A Practical Migration Path

Auspexi • Updated: • Read time: ~10–12 minutes
TL;DR: We already ship air‑gapped packages, dual‑control signing, and evidence bundles with crypto inventories. Our roadmap adds hybrid signatures (ECDSA + ML‑DSA) and ML‑KEM for app‑level key exchange, enforced by policy gates that fail‑closed when a non‑PQC path is detected. All calibration runs in your tenant (zero‑trust), and no raw data leaves by default.

Why quantum‑safe matters now

NIST has finalized post‑quantum standards (ML‑KEM, ML‑DSA, SLH‑DSA, HQC). Major vendors are rolling out quantum‑resilient roadmaps across TLS, signatures, and key exchange. For builders delivering evidence‑bearing AI, crypto agility and migration discipline are as important as model quality.

What AethergenPlatform already ships

Our PQC migration approach

We treat PQC like any other safety upgrade: inventory —› hybrid —› default —› deprecate legacy.

  1. Inventory: declare hash/signature algorithms per artifact (manifest.json + crypto_profile.json) and surface them in evidence.
  2. Hybrid: adopt hybrid signatures (ECDSA + ML‑DSA) and hybrid key exchange (ECDH + ML‑KEM) at the application layer.
  3. Policy gates: CI and runtime gates fail‑closed when the required PQC profile is not present.
  4. Default + deprecate: once hybrid is stable, move to PQC‑only for high‑risk packages, keep hybrid for broad compatibility.

What “hybrid” means here

Operational guardrails

Running in your tenant (zero‑trust)

The safest place to calibrate is your environment. We provide notebooks that compute anchors and run acceptance checks inside your Databricks account, then export only signed summaries. This keeps your secrets and data in your control while producing proof that auditors can file.

Roadmap highlights

Get hands on

We’re happy to run a private pilot to produce PQC‑ready evidence for your environment and policies.