Solutions

Quantum-Safe Connections

Someone is recording your mTLS traffic today to decrypt it when a quantum computer arrives. Riptides enforces post-quantum hybrid key exchange at the kernel level — no code changes, no redeployment.

Your Encrypted Traffic Is a Permanent Record

Harvest Now, Decrypt Later

Adversaries are passively capturing TLS handshakes and ciphertext today — no exploit, no alert. They will decrypt retroactively when a cryptographically relevant quantum computer exists. Every unprotected handshake is a permanent record.

SPIFFE IDs expose infrastructure topology

Harvested mTLS handshakes don't just leak session data — they reveal SPIFFE IDs, certificate issuance patterns, and which workloads communicate with which. That architectural intelligence remains useful years after the sessions end.

TLS 1.2 has no migration path

The IETF will not define post-quantum cipher suites for TLS 1.2. Any service still speaking TLS 1.2 is categorically excluded from a quantum-safe future. There is no upgrade — only replacement.

Default protection is easily lost

Some runtimes now ship post-quantum hybrid key exchange on by default — but common TLS configuration patterns and framework helpers silently disable it. Most teams assume they're protected and aren't.

Sound familiar?

If you lead security or compliance This is the audit finding that arrives before you've had a chance to prioritize it — and the window for protecting traffic that already left your network has already closed.
If you lead platform or infrastructure engineering This is the migration you want to get ahead of, not the one that lands as an emergency when the compliance team discovers your services have inadvertently disabled hybrid key exchange.

PQC Hybrid Key Exchange, At the Kernel Level

Riptides enforces post-quantum hybrid key exchange (X25519 + ML-KEM-768) on every internal mTLS handshake — via the kernel module, without touching application code or TLS configuration. Classical peers fall back gracefully.

2

Enable post-quantum hybrid mode

Enable post-quantum hybrid mode in the Riptides kernel module. The module negotiates X25519MLKEM768 hybrid key exchange for every mTLS handshake it handles. No application restart, no TLS library changes.

3

Roll out incrementally, verified

Enable per service or per namespace. Peers that don't support PQC hybrid key exchange fall back to classical ECDHE — no broken connections. Verify actual negotiation with the safetls inspector before expanding coverage.

What Changes for You

The harvest window closes

With PQC hybrid key exchange enforced at the kernel level, session keys can't be recovered by running Shor's algorithm against recorded handshakes. Traffic captured after enabling Riptides PQC mode is safe against retroactive quantum decryption. Traffic captured before enabling it is not — which is why starting today matters.

No code changes, any language

The kernel module handles the TLS handshake. Go, Python, Java, Rust — any service making outbound mTLS connections gets PQC hybrid key exchange without touching TLS configuration, updating libraries, or redeploying.

Hybrid mode is always safe

X25519MLKEM768 hybrid key exchange retains classical ECDHE security even if ML-KEM were later found flawed. You are not trading one for the other — you are adding a second, independent layer on top.

Enforcement you can prove

Riptides provides per-connection visibility into negotiated TLS parameters — version, cipher suite, key exchange group. When the compliance question arrives, the answer is a query, not an assumption.

Why not just...

Update our TLS libraries?

Some runtimes now ship post-quantum protection on by default — but common TLS configuration patterns silently disable it, and you'd never know. For services written in other languages, it's entirely up to you. Riptides enforces post-quantum hybrid key exchange at the kernel level, regardless of what the application's TLS configuration says.

Deploy a service mesh?

A service mesh adds a sidecar to every pod to handle mTLS. That's a substantial operational footprint — and most service mesh implementations don't yet ship post-quantum hybrid key exchange in production configurations. Riptides handles mTLS at the kernel module level, already running on your hosts, with post-quantum mode ready to enable.

Where to Start

The Fastest Win

East-West Internal Traffic

Internal service-to-service mTLS is the highest-value target for harvest-now, decrypt-later. You own both ends — no need to wait for industry-wide PQC adoption. Enable post-quantum hybrid mode on your most sensitive internal traffic paths first: auth services, secrets management, internal APIs that carry PII.

Then Expand

Audit your service TLS posture

Audit your services for configuration patterns that silently disable post-quantum hybrid key exchange. Use safetls.riptides.io to confirm what's actually being negotiated.

Eliminate TLS 1.2

TLS 1.2 has no PQC migration path. Identify remaining TLS 1.2 services and migrate them to TLS 1.3 — a prerequisite for any quantum-safe future.

Certificate signature migration

ML-DSA certificate signatures are coming as the CA ecosystem matures. Riptides will track and support this next phase as SPIRE and the CA/Browser Forum finalize standards.

Classical vs. Quantum-Safe

Classical TLS (today) Riptides PQC Hybrid
Key exchange algorithm ECDHE (X25519 or P-256) X25519MLKEM768 hybrid
Quantum resistance Broken by Shor's algorithm Resistant to known quantum attacks
Retroactive decryption risk All stored traffic decryptable Session keys unrecoverable from transcript
TLS version required 1.2 or 1.3 TLS 1.3 (enforced)
Code changes needed Library updates, config changes per service None — kernel module handles it
Audit posture "We think our runtime defaults are protecting us" Per-connection negotiation log, queryable

For a deep dive on Harvest Now, Decrypt Later, Shor's algorithm, and the full quantum threat model for workload identity, read our technical post: The Quantum Threat to Workload Identity and Why It Starts Today →

Ready to secure your
workloads?

Kernel-level identity and enforcement. No code changes. Deploy in minutes.