Important News:SafeLogic Announces CryptoComply Go v4.0 with Comprehensive PQC Capabilities!! Read the announcement.
To Proxy or Not to Proxy
September 24, 2025 •Alex Zaslavsky

Practical quantum computers will eventually break today's public-key cryptography. NIST's Post-Quantum Cryptography (PQC) standards are emerging to resist these attacks. But not every environment can flip overnight to PQC across the board.
One option is post-quantum tunnels: dedicated gateways that encapsulate data inside a PQ-secured channel before forwarding it. Think VPN, but with PQ key exchange or hybrid (PQ + classical) crypto at the outer layer. Like Web Application Firewalls (WAFs), these tunnels can reduce risk quickly — but whether they are a temporary bridge or a longer-term control should be driven by your security architecture and threat model, not a one-size-fits-all timeline.
What Post-Quantum Tunnels Do
- Overlay protection: A gateway negotiates a PQ or hybrid key exchange, then wraps legacy traffic inside it
- Pros: Fast deployment, centralized key management, shields legacy systems.
- Cons: Extra latency, single point of failure, and the underlying traffic still uses legacy crypto. Digital signatures remain untouched.
When Proxied PQ Tunnels Make Sense
- Wrapping insecure or legacy endpoints that cannot be upgraded to PQC
- Mitigating "harvest-now, decrypt-later" risk for long-life data
- Government or enterprise WANs where a few gateways are easier to upgrade than thousands of apps
- Piloting PQ crypto in production without modifying existing systems.
When Direct PQ Algorithms Are Essential
- Mission-critical applications/crown-jewel data: upgrade at the source where compromise risk is unacceptable
- End-to-end security: if compromised proxies are in your threat model, prioritize PQ algorithms at the endpoints
- Latency-sensitive workloads: double encryption and routing may not work for SCADA, HFT, etc.
- Digital signatures: proxies can't "upgrade" signatures for software updates, documents or non-repudiation — swap RSA/ECDSA for PQ signature schemes at the endpoint
- Long-term simplicity: running legacy crypto inside a PQ wrapper adds operational complexity; direct PQ adoption is cleaner and future-proof.
A Practical Roadmap
- Identify choke points where traffic enters/exits.
- Deploy PQ tunnels there where appropriate to shield recorded traffic now.
- For crown-jewel systems, begin replacing digital signatures and crypto at the endpoints directly.
- Prioritize high-value or long-life data for early PQ adoption.
- Gradually upgrade other endpoints to PQ protocols as vendor support matures.
- Phase out tunnels where possible as systems become PQ-native — treat them as a supplement, not an automatic substitute.
The Bottom Line
Post-quantum tunnels aren't always just a "temporary bridge." In some cases, they're the only realistic option for hard-to-migrate systems; in others they're too weak a control for critical workloads. Use them where they fit your threat model and architecture — but keep the end goal in sight: a network where both encryption and signatures are post-quantum directly at the endpoints.
Alex Zaslavsky
Alex is a Lead Software Engineer at SafeLogic.
Popular Posts
Search for posts
Tags
- FIPS 140 (109)
- FIPS Validation (79)
- NIST (65)
- CryptoComply (62)
- Encryption (61)
- Cryptography (60)
- CMVP (51)
- Cryptographic Module (49)
- Industry News (47)
- Compliance (44)
- RapidCert (42)
- Conversations (34)
- SafeLogic News (30)
- Post-Quantum Cryptography (PQC) (28)
- FIPS 140-3 (25)
- CAVP (23)
- Federal (23)
- OpenSSL (20)
- Cybersecurity (17)
- FedRAMP (14)
- Government (14)
- Healthcare (12)
- DoD (11)
- CMMC (8)
- NIST 800-53 (7)
- Entropy Source Validation (5)
- NIST 800-171 (5)
- iOS (5)
- Common Criteria (4)
- Entropy (4)
- GovRAMP (4)
- RSA Conference (4)
- TLS 1.3 (4)
- Crypto-Agility (3)
- Public Sector (3)
- FIPS 140-2 (2)
- DoDIN APL (1)
- Finance (1)