Expert technical analysis on quantum computing, post-quantum cryptography, and quantum-safe infrastructure for Ireland and the EU.
Enterprise Security Architecture | Ireland | EU
Meta Description: Complete guide to quantum-safe infrastructure for Irish enterprises by Michael English (IMPT.io CTO). Cryptographic inventory, hybrid deployment, PKI migration, HSM selection, and EU compliance.
Target Keywords: quantum-safe infrastructure Ireland, post-quantum migration guide, PQC enterprise deployment Ireland EU, quantum-safe PKI Ireland, quantum migration enterprise Ireland, Michael English quantum infrastructure
There is no shortage of awareness of the quantum threat in Irish enterprise security circles. NIST's finalised standards, ENISA's recommendations, NSA's CNSA Suite 2.0 mandates, and the Central Bank of Ireland's DORA guidance have collectively raised the conversation from "theoretical future risk" to "current operational priority."
What is still lacking for most Irish organisations is a concrete, step-by-step roadmap for actually building quantum-safe infrastructure. That's what this guide provides. Based on my experience architecting blockchain infrastructure at IMPT.io — where we completed our own quantum-safe migration programme — I'll walk you through every phase of the journey.
Before any technical work begins, you need executive sponsorship and clear scope. Quantum-safe migration touches every system that uses asymmetric cryptography — which is virtually every system that communicates over a network.
The business case for quantum-safe migration centres on three pillars:
Scope the migration in three rings:
Ring 1 — Customer-facing systems: Web applications, APIs, mobile apps, payment processing. Protect these because customer data is directly at risk.
Ring 2 — Internal infrastructure: Server-to-server communication, database connections, internal PKI, VPN, SSH. Protect these because internal breach exposes all Ring 1 systems.
Ring 3 — Data at rest and archives: Long-lived sensitive data encrypted with asymmetric key wrapping. Protect these because harvested ciphertexts have the longest exposure window.
You cannot migrate what you cannot see. A cryptographic inventory is a complete catalogue of every asymmetric cryptographic operation in your systems.
For each cryptographic touchpoint, record:
Automated scanning:
nmap --script ssl-enum-ciphers — scan hosts for TLS cipher suitestestssl.sh — comprehensive TLS configuration analysissslyze — Python-based TLS scannergovtech-sg/certificate-inventory — scan certificate storesCode scanning:
# Find hardcoded cryptographic references in code
grep -r "RSA\|ECDSA\|secp256\|P-256\|sha1WithRSA" --include="*.java" --include="*.py" --include="*.go" /your/codebase
# Find OpenSSL cipher string references
grep -r "TLSv1\|AES128\|DHE\|ECDHE" /etc/nginx/ /etc/apache2/
Certificate inventory:
# List all certificates in a Java keystore
keytool -list -v -keystore /path/to/keystore.jks
# Check server certificate
openssl s_client -connect your-server.com:443 | openssl x509 -noout -text | grep "Public Key"
# List certificates in system store (Linux)
ls /etc/ssl/certs/ | head -20
After inventory, prioritise migration by:
Priority = (Data Sensitivity × Data Longevity) / Migration Complexity
High Sensitivity × Long-lived × Low complexity = Migrate First
Low Sensitivity × Short-lived × High complexity = Migrate Last
Hybrid TLS deployment is the highest-impact, lowest-risk first step. It adds quantum-safe key exchange to all TLS connections without removing classical security.
# Enable hybrid key exchange in Nginx 1.25+ with OpenSSL 3.x + OQS provider
ssl_protocols TLSv1.3;
ssl_prefer_server_ciphers off;
# Configure hybrid key exchange groups
ssl_ecdh_curve X25519MLKEM768:x25519:secp256r1:secp384r1;
# X25519MLKEM768 = hybrid X25519 + ML-KEM-768
global
ssl-default-bind-ciphers ECDHE-ECDSA-AES256-GCM-SHA384:...
ssl-default-bind-options ssl-min-ver TLSv1.3
frontend https_front
bind *:443 ssl crt /path/to/cert.pem alpn h2,http/1.1
# HAProxy 2.8+ supports OQS curves through OpenSSL integration
AWS began rolling out PQC hybrid TLS in 2024. Enable it through:
ELBSecurityPolicy-TLS13-1-3-2021-06 or newer PQC-enabled policy (check current AWS documentation for availability)Cloudflare has deployed X25519MLKEM768 globally on its edge network. Irish businesses using Cloudflare receive quantum-safe TLS automatically for:
Your Public Key Infrastructure (PKI) — the Certificate Authorities that issue, sign, and revoke certificates — must be migrated to support PQC.
Most organisations have:
Migration order: Migrate roots first (most impactful, longest lived), then intermediates, then leaf certs.
DigiCert: Committed to issuing PQC-hybrid certificates and ML-DSA certificates. Participating in NIST PQC trials. Check DigiCert's website for current PQC certificate availability.
Sectigo: Has issued test PQC certificates and published PQC readiness roadmap.
Let's Encrypt: For free certificates (DV only), Let's Encrypt will follow browser/CA policy. Watch CABF (CA/Browser Forum) for PQC certificate policy timelines.
# Check current CA configuration
certutil -getreg CA\CSP\Provider
# For internal PKI migration, use Windows Server 2025's PKCS#11 interface
# with an OQS-capable HSM provider
# Steps:
# 1. Upgrade HSM firmware to support ML-DSA
# 2. Generate new ML-DSA root CA key pair in HSM
# 3. Create hybrid root CA (dual-signed with existing ECDSA root)
# 4. Issue new intermediate CA from ML-DSA root
# 5. Begin issuing hybrid leaf certificates
For maximum compatibility, deploy both classical and PQC certificate chains:
# Serve both ECDSA and ML-DSA certificates (dual-stack)
ssl_certificate /etc/ssl/ecdsa_cert.pem;
ssl_certificate_key /etc/ssl/ecdsa_key.pem;
ssl_certificate /etc/ssl/mldsa_cert.pem;
ssl_certificate_key /etc/ssl/mldsa_key.pem;
# TLS 1.3 clients that support ML-DSA will use the PQC certificate
# Legacy clients fall back to ECDSA
Hardware Security Modules (HSMs) are the most critical and most challenging component of quantum migration.
| Vendor | PQC Status (2025) |
|---|---|
| Thales Luna (nShield) | Firmware upgrade available for ML-KEM, ML-DSA on select models; new HSM 4.0 line PQC-ready |
| Utimaco | PQC-ready firmware for CryptoServer series; ML-KEM and ML-DSA supported |
| AWS CloudHSM | Preview PQC support for ML-KEM; full GA expected 2025-2026 |
| Azure Dedicated HSM | Using Thales Luna hardware; follows Thales firmware roadmap |
| Entrust nShield | PQC firmware updates available; contact vendor for upgrade path |
| YubiKey (Yubico) | YubiKey 5 Series: no PQC support yet. Future YubiKey hardware required |
Key question to ask your HSM vendor: "What is your roadmap for FIPS 140-3 certification of ML-KEM and ML-DSA operations?"
For cloud-native organisations using software KMS:
# Python: hybrid key wrapping using OQS library
import oqs
import os
from cryptography.hazmat.primitives.ciphers.aead import AESGCM
def quantum_safe_key_wrap(plaintext_key: bytes) -> dict:
"""Wrap a symmetric key using hybrid ML-KEM-768 + X25519"""
# ML-KEM-768 key encapsulation
with oqs.KeyEncapsulation("ML-KEM-768") as kem:
public_key = kem.generate_keypair()
ciphertext_mlkem, shared_secret_mlkem = oqs.KeyEncapsulation("ML-KEM-768").encap_secret(public_key)
# Derive AES-256 wrapping key from combined shared secrets
import hashlib
wrap_key = hashlib.sha256(shared_secret_mlkem).digest()
# Wrap the plaintext key
nonce = os.urandom(12)
aead = AESGCM(wrap_key)
wrapped_key = aead.encrypt(nonce, plaintext_key, None)
return {
'wrapped_key': wrapped_key,
'mlkem_ciphertext': ciphertext_mlkem,
'mlkem_public_key': public_key,
'nonce': nonce
}
Application-level migration addresses asymmetric cryptography embedded in application code — JWTs, API authentication, code signing, and custom cryptographic protocols.
JSON Web Tokens (JWTs) using RS256 or ES256 must migrate to ML-DSA-65:
# pip install PyJWT oqs-python
import jwt
import oqs
import json
from datetime import datetime, timedelta
# Generate ML-DSA-65 key pair
with oqs.Signature("ML-DSA-65") as sig:
public_key = sig.generate_keypair()
secret_key = sig.export_secret_key()
# Create and sign JWT with ML-DSA-65
# Note: Standard JWT libraries need PQC extension; use custom implementation during transition
payload = {
'sub': 'user-id-123',
'iss': 'https://auth.impt.io',
'iat': datetime.utcnow().timestamp(),
'exp': (datetime.utcnow() + timedelta(hours=1)).timestamp()
}
# Generate ML-KEM-768 SSH key pair (using OpenSSH + liboqs)
# Standard OpenSSH does not yet support PQC natively;
# use OQS-OpenSSH fork for testing
# With standard OpenSSH: use large classical keys as interim
ssh-keygen -t ed25519 -C "user@organisation.ie" # Most quantum-resistant classical option
# Monitor openssh.com for native PQC support (expected 2025-2026)
# OpenSSH 9.x drafts include experimental support for ML-KEM hybrid
# Migrate code signing to ML-DSA using OQS tools
# For production: use vendor-certified solutions (DigiCert, Sectigo)
# Test with OQS command line tools:
openssl cms -sign -in software-package.zip -signer ml-dsa-cert.pem \
-inkey ml-dsa-key.pem -outform DER -out signature.p7s \
-provider oqsprovider -provider default
Document your quantum-safe migration for regulatory auditors:
| Activity | Effort | Cost Estimate |
|---|---|---|
| Cryptographic inventory | 3 days internal | €0–€2K |
| Hybrid TLS (CDN/cloud) | 1 day | €0 (Cloudflare/AWS config) |
| SSH key rotation | 1 day | €0 |
| Certificate migration | 2 days | €200–€500/year cert costs |
| **Total** | **~1 week** | **€500–€3K** |
| Activity | Effort | Cost Estimate |
|---|---|---|
| Cryptographic inventory | 2–3 weeks | €5K–€15K (internal + tooling) |
| Hybrid TLS deployment | 1 week | €2K–€5K engineering |
| PKI migration | 4–8 weeks | €10K–€30K |
| HSM firmware upgrade | 2 weeks | €5K–€15K (vendor support) |
| Application migration | 2–6 months | €20K–€80K |
| **Total** | **6–12 months** | **€42K–€145K** |
Building quantum-safe infrastructure is not a single project — it's a multi-year programme. But the journey begins with a single step: the cryptographic inventory. Everything else follows from knowing what you have.
The good news for Irish enterprises: the tools, standards, and vendor support all exist now. The investment required is proportionate to organisational size and risk profile. And the regulatory environment — NIS2, DORA, GDPR — is increasingly compelling action regardless of internal risk appetite.
Start with Phase 1 today. The inventory is low-cost, immediately valuable, and positions you to make every subsequent decision from a place of knowledge.
Michael English is Co-Founder & CTO of IMPT.io, which has completed quantum-safe migration of its blockchain infrastructure serving EU carbon markets. He advises Irish enterprises on PQC migration. Based in Clonmel, Co. Tipperary, Ireland.
Keywords: quantum-safe infrastructure guide Ireland, post-quantum migration enterprise, PQC deployment Ireland enterprises, quantum-safe PKI Ireland, quantum infrastructure migration EU, Michael English quantum infrastructure Ireland