Penta Security Completes Integration of PQC and KPQC for Quantum-Ready Cryptographic Transition
Penta Security, a Top global cybersecurity company in the Global Cybersecurity market, has successfully completed the integration of both NIST-standardized post-quantum security algorithms (PQC) and Korea’s national post-quantum security algorithms (KPQC) into its proprietary cryptographic modules. With this milestone, Penta Security has established a robust technical response framework to support secure cryptographic transition in the emerging quantum computing era.

As advancements in quantum computing accelerate, concerns are growing that conventional cryptographic algorithms could become vulnerable. In response, the global cybersecurity industry is actively preparing for a transition to post-quantum security, widely known as PQC. Similarly, South Korea is advancing preparations for a national cryptographic policy shift centered on KPQC.
However, financial institutions, public sector systems, and enterprise IT infrastructures have been built over decades on existing cryptographic frameworks. A full-scale replacement in a short timeframe presents significant risks, including operational disruption and high costs. Therefore, a phased transition approach is gaining traction as a practical solution. This method allows organizations to maintain existing cryptographic systems while simultaneously adopting post-quantum security technologies.
To address this market demand, Penta Security has implemented globally recognized PQC algorithms, including Dilithium for digital signatures and Kyber for key exchange, alongside Korean KPQC algorithms such as SMAUG-T and HAETAE within its cryptographic modules. Notably, the company designed these implementations using a hybrid cryptographic architecture that combines legacy and post-quantum security algorithms. This approach enables seamless adoption without requiring a complete system overhaul.
The core principle of this hybrid cryptographic structure lies in parallel transition rather than full replacement. Organizations can deploy post-quantum security alongside existing systems without modifying current architectures or interfaces. Furthermore, this flexible framework allows gradual expansion in alignment with evolving national cryptographic policies and global standards. This is not merely an addition of new algorithms but the establishment of a future-ready technology platform capable of accommodating newly standardized post-quantum security algorithms.
Click here to subscribe our Newsletter
