- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
This blog was written by Saad Khan, Sr. Technical Marketing Engineer
The cybersecurity landscape is rapidly evolving, driven by the looming threat of cryptographically relevant quantum computers (CRQCs) . When fully realized, these machines will have the capability to break the public/private key encryption algorithms that secure our digital way of life. As part of our commitment to ensuring future-proof security, Palo Alto Networks is excited to introduce a groundbreaking feature in our next-generation firewalls (NGFWs) running PAN-OS 12.1 Orion: Quantum-Safe Cipher Translation.
This new functionality allows organizations to begin the critical transition to post-quantum cryptography (PQC) immediately, without disrupting existing infrastructure or waiting for a complete industry-wide PQC overhaul. Industry experts expect that this transition will take many years requiring significant updates to devices, applications and infrastructure.
This will especially be challenging for the 100s and 1000s of private applications that use a variety of underlying cryptography libraries. Often application developers don’t know which crypto modules are in use, which cipher algorithms are negotiated or how they are configured.
The Quantum-Safe Cipher Translation feature in PAN-OS 12.1 Orion tackles the challenge of migrating TLS communications to a quantum-safe standard.
The core of this feature is the hybrid key exchange mechanism. This mechanism enables the translation of a TLS classical cipher suite into a quantum-safe equivalent or vice-versa. This translation is performed seamlessly on the firewall, ensuring that the traffic flowing through your network is secured with both a classical (e.g., ECDHE) and a quantum-safe (PQC) key exchange algorithm simultaneously.
The Quantum-Safe Cipher Translation feature provides flexibility in selecting post-quantum key exchange mechanisms (KEMs) based on your organization's risk tolerance and standardization requirements. See documentation for the list of cipher suites supported in PAN-OS 12.1
The firewall allows you to configure and use the following Key Exchange Algorithms:
|
PQC Standard |
Key Exchange Algorithm |
Description |
|
PQC-Standard |
ML-KEM |
NIST standardized algorithm for Key Encapsulation Mechanism (KEM). Recommended for immediate adoption. |
|
PQC-Experimental |
HQC |
Classic McEliece variant, often considered for long-term security. |
|
PQC-Experimental |
BIKE |
QC-MDPC code-based algorithm, designed for high performance. |
|
PQC-Experimental |
Frodo-KEM |
Lattice-based key encapsulation mechanism, known for its conservative security model. |
By separating these algorithms into 'Standard' and 'Experimental' categories within the Decryption Profile settings, PAN-OS provides a clear path for organizations to adopt NIST-standardized PQC while also allowing for testing and readiness with emerging alternatives, if necessary.
The Quantum-Safe Cipher Translation is implemented through a hybrid key exchange process. This process combines a traditional, well-vetted classical algorithm with a new, quantum-safe algorithm.
Here is a simplified workflow:
To begin leveraging this critical new security feature, follow these general steps:
4. Once you have created the decryption profile object, it can be applied to the decryption policy under Policies → Decryption.This Profile can be applied to both SSL Inbound Inspection and SSL Forward Proxy.
When securing internally hosted applications accessed by external clients the SSL Inbound Inspection use case is ideal. This is often the first step for organizations with modern clients (e.g., Google Chrome, Microsoft Edge, and Prisma Browser) that support Hybrid Key Exchange mechanisms (like X25519MLKEM768).
How it works:
This approach provides immediate PQC security to external clients without requiring any changes or upgrades to the back-end application servers.
For securing outbound traffic from internal users, OT/IoT or any application connections to external resources, the SSL Forward Proxy use case is essential, particularly when you cannot import the destination server's certificate onto the firewall.
How it works:
This method ensures that outbound traffic is secured with PQC protection, providing resilience for your critical infrastructure without requiring PQC support from internal client machines or external servers.
Palo Alto Networks NGFWs significantly ease the transition to a quantum-safe world, which can otherwise be a multi-year, resource-intensive endeavor. The Quantum-Safe Cipher Translation feature simplifies this process by enabling quantum-safe compliance through a no-code-change translation of traffic, potentially saving customers millions of dollars in effort and protecting them against attackers.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
| Subject | Likes |
|---|---|
| 2 Likes | |
| 2 Likes | |
| 1 Like | |
| 1 Like | |
| 1 Like |
| User | Likes Count |
|---|---|
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 1 |


