Cisco Research

HomeOur TeamPublications
Contact us
Cisco Logo
  • Help
  • Cookies
  • Terms & Conditions
  • Trademarks
  • Contact

© 2026 Cisco Systems, Inc.

    Cisco Research

    HomeOur TeamPublications
    Quantum Research
    About Quantum LabsQuantum Publications
    Outshift Quantum Blogs
    Explore Quantum in action

    Research topics

    Quantum Networking

    Quantum Digital Twin

    Quantum Security

    Quantum Data CenterQuantum Resistence

    Research topics

    Security for AIAI for security
    FlameResponsible AIModelSmithMultiWorld
    BlazeDeep VisionLionPolygraph LLM

    Learn more

    Sponsored ResearchOpen RFPs
    Contact us
    powered byoutshift

    Quantum
    Resistant

    Quartz: Post-Quantum Security Risks & Remediation

    Problem:
    • Post-quantum cryptography risks within next few years
      • network, data, cloud, APIs, software, hardware
    • Cryptography libraries, configs scattered across the stack, across components/services, legacy
    • Significant systemic challenges:
      • Adoption of new cryptography protocols, libraries does not happen overnight
      • NIST standard algorithms
    Diagram
    Approach:
    • Detect and monitor vulnerabilities, attack paths - ciphersuite dependency graph, cryptography BOM
    • Measure: Automatically determine the attack surface, high-risk PQ-unsafe points
    • Mitigate: Automatic PQ remediation planning
      • PQ-safe algorithms, libraries, QKD/QRNG, …​
      • Carry out remediation
    Diagram

    Quartz: Post-quantum security observability and posture analysis

    Diagram
    • What are the vulnerabilities in a system with respect to quantum threats to cryptography?
      • Is data flow - data-at-rest, data-in-motion, data-in-use quantum-safe?
      • Is network and API connections are quantum-safe?
      • Are hardware artefacts such as TPM, HSMs, secure enclaves quantum-safe?
      • Are systems, decentralized blockchain platforms quantum-safe?
      • Where are the quantum-specific vulnerabilities, risks in a distributed cloud system?
    • Our solution carries out a quantum-specific threat analysis, risk analysis and remediation planning for such systems in a blackbox and whitebox manner.