Picture this: a quantum computer exists which can handle complex problems that are practically unsolvable for today’s computers as the calculations would take centuries. Which contributes to new products and services. Which has the potential to help in the development of personal medicines. However, we also need answers regarding the security risks of the quantum age. This is why it’s crucial to secure information against attacks that use a quantum computer. TNO can help companies to make networks quantum-safe and to solve legacy problems. The quantum-safe VPN connection (Virtual Private Network) is an example of this. 

Quantum-safe Crypto

Cryptography is widely used to shield information from unauthorised access. This has been successful because even the fastest computers would take hundreds to millions of years to decipher encrypted information. With the advent of the quantum computer, however, this will change.

Although it will take some time before a quantum computer that can crack cryptography actually exists, it’s important to take action now. All encrypted information which is currently being communicated or stored can be saved for later cracking by a quantum computer. To ensure that confidential information remains secure for a long time, it is important to develop cryptosystems that can withstand attacks from both the current computer and the quantum computer: so-called post-quantum cryptography or quantum-safe cryptography.

How to make your organisation Quantum-safe

Find out which steps you need to take

Download position paper

Solving legacy problems

Organisations have many software applications running, which often results in a lack of a complete overview. In addition, old systems  so-called legacy systems  are still in use far beyond their expected lifespans and are used to support important, critical and often large-scale ICT processes. This legacy of systems puts a damper on innovation and poses an ever-increasing risk to stability and reliability. To solve this legacy problem, untangle the chaos and make the network quantum-safe, a smart solution is needed.

Where do you start untangling?

The advent of the quantum computer and existing legacy problems create challenges for companies. One often no longer knows what’s going on within the company network and it’s difficult to determine if the most recent version of cryptography is being used everywhere. Figuring this out and then re-securing your systems is a huge task. Where should you start? With the inventory – and TNO can help with this.

Tool: advanced security proxy

The Advanced Security Proxy (ASP) not only helps to make an inventory of the security of software systems in use but can also be a guarantor of secure traffic. The ASP can be used to make organisations quantum-safe. The tool – which can make efficient use of programmable hardware – can provide insights into legacy problems while mitigating security risks through the quantum-safe encryption of data exchanges. The ASP can improve the security of older systems without reworking the older systems themselves. You could compare this to a smart VPN connection, but in this case the ASP is an element between the network and the internet which is capable of monitoring all connections to the internet.

The ASP quickly performs deep packet inspection on (potentially encrypted) communication channels using programmable hardware. The tool performs various gateway functionalities, such as monitoring the security level of the cryptography in use and upgrading the cryptography to set up more secure channels that traverse less secure networks, such as the internet. By upgrading the encryption used, the ASP protects older devices that cannot do this independently. If you want to know more about how the ASP works, you can read further here.

The advantages of asp: cheaper and simpler

The ASP protects older network systems against current security threats without requiring the organisation concerned to directly invest in major network updates. This is a much cheaper solution as the implementation costs of the ASP are low. Furthermore, there is no need to update the entire security portfolio when the ASP is implemented. The tool is a natural addition to your current security portfolio. The ASP can therefore save the Dutch business community a lot of costs, especially for organisations with an extensive network infrastructure.

The ASP is a multifaceted system. It can be added to an existing security portfolio as a passive or active element or a combination of both, depending on the desired functionality. As a passive element, it can serve as a lifelong crypto-inspector. As an active element, the ASP can be used to increase the security of legacy systems. Interested in the ASP? Please contact Maran van Heesch.

Tool: Quantum-Safe VPN

VPN connections are often used to give people who work from home access to their employer’s internal network, for example. With the help of a VPN connection, a secure connection can be made to the employer’s network over the home network’s internet. VPN connections make use of an encrypted connection. The cryptography used for this is not quantum-safe and therefore carries a security risk. The data sent over the VPN connection are currently not protected against attacks by a quantum computer.

Post-quantum cryptography can be used to make VPN connections quantum-safe. At TNO, we have tested this with OpenVPN. There are different types of post-quantum cryptography, each with different properties. Through our tests, we have made it clear that some types of cryptography require more bandwidth while others require more computing power. It is important to investigate the impact that post-quantum cryptography will have and which type is most suitable for different security products.

Another example of a security product which is affected by the quantum computer is the public key infrastructure (PKI), which is widely used for digital authentication. The migration to quantum-safe PKI is more complex than the migration to quantum-safe VPN, both from a technical and governance perspective.


Within TNO, there is a strong foundation of applied cryptographic knowledge and a lot of expertise in the fields of internet, communication networks and cybersecurity. This unique combination enables us to oversee the impact of post-quantum cryptography and to advise and guide organisations in the transition process for their information security.

Would you like to know more about what TNO is doing in the field of quantum-safe cryptography?

Please contact Maran van Heesch


10 cyber security challenges and innovations

What steps do we need to take to improve cyber security in the Netherlands? What cyber threats lie ahead of us? TNO works with organisations to address not just today’s cyber security challenges, but... Read more

Optimising care by encrypting patient data

Healthcare costs in the Netherlands amount to 100 billion euros annually (10% of GDP) and are expected to rise to over 170 billion euros by 2040. It is essential to continue improving care and to keep... Read more
Our work

Cybersecurity for complex networks

Self-driving cars can no longer be viewed as a single system. These are cars with complex computer systems that independently make countless connections with the driver, with other vehicles, with the... Read more
Our work

Carefree entrepreneurship thanks to security monitoring and detection

Technology, data and data-driven solutions are becoming increasingly important to the functioning of our society. The Netherlands is experiencing rapidly growing digitalisation in terms of processes... Read more
Our work

Future quantum computers could offer possibilities for cancer detection

Quantum technology is seen as a key technology that will enable new products and services. Together with TU Delft, TNO is working within QuTech on the computer of the future: the quantum computer. Quantum... Read more
Our work

The Digital Resilience of The Netherlands

Our Dutch defence and security organisations, including the national police and the NCTV, are jointly responsible for our national security – including in the digital domain. In addition to the sea, land,... Read more


Drs. Ir. Maran van Heesch

  • quantum applications
  • quantum computing
  • quantum security
  • cryptography