Anton Guglya is the head of qApp, a Russian company developing integrated cybersecurity software solutions based on post-quantum encryption algorithms. In 2022, the qApp team presented a pilot project unique for Russia, providing quantum-stable data protection of Gazprombank, and also proved the compatibility of domestic Baikal and Elbrus processors with post-quantum cryptography. Anton Gugli's interview — in the TASS project "Conversations with Ivan Survillo"— Imagine that I am eight years old and I ask you what you do.
— I would try to explain through the model of superheroes and supervillains.
Supervillains are super because they use the most promising, the best technologies that are available to them to carry out villainous activities. In addition to physical attacks and threats, they are waging an information war, wanting to steal the information they need.
We are superheroes who develop technologies and confront supervillains. Whoever these supervillains are. We are developing a new level of protection of valuable information.
— What are they new in?— Here, I think, I will no longer answer like a child.
To begin with, a new class of computing devices is actively developing now — quantum computers. They are getting more and more powerful every year. On the one hand, they are created to speed up the solution of various important tasks: for example, optimization tasks, modeling tasks of new materials, artificial intelligence tasks. On the other hand, they can be used by an attacker.
With the help of sufficiently powerful quantum computers, an attacker is able to crack most modern algorithms of asymmetric cryptography, which are used everywhere. For example, in bank systems or in various government services.
About the quantum threat, compatibility with domestic processors and the emergence of the market
— The quantum threat.- yes.
Quantum threat is a cybersecurity risk in which an attacker will use quantum computers to carry out an attack on data encrypted with traditional cryptography.
So far, quantum computers do not have such power, which would be enough for a full-fledged attack. But the danger is already there. Let's assume that an attacker today manages to save the data he is interested in, even if encrypted with traditional cryptography. He stores them and waits until he has access to a sufficiently powerful quantum computer. As soon as he receives it, he will be able to decrypt the data very quickly, and then use it to his advantage — sell it and so on.
It doesn't matter when he gets such access. It is important that the data that will be relevant, for example, in the horizon of ten years or more, is at risk. This can be financial and personal data, as well as corporate, state and military secret data. In general, there are many options, even if we do not operate on the Federal Law, according to which some data needs to be stored for 75 years or more. It is important that if they are encrypted with traditional asymmetric cryptography, they can be saved by an attacker now and hacked later.
It is predicted that sufficiently powerful quantum computers will appear in the range between the 28th and 32nd year. This is a kind of forecast that is constantly being discussed and clarified by the international scientific, technological and cryptographic communities. In addition, McKinsey analysts believe that a number of industries may face the first quantum attacks before 2025.
Our company helps strengthen classical cryptography to counter the quantum threat. The technology that we will talk about next is called post-quantum cryptography, in fact, it replaces the algorithms of asymmetric cryptography with a new class of algorithms.
My team and I are engaged in the software implementation of algorithms and on their basis we create software products that can be easily implemented into various information systems, thereby increasing their level of cybersecurity. In another way it is called middleware software - middleware.
It is important here that the new algorithms do not lower the level of protection against classical attacks in any way. We continue to provide protection against attacks using classical computers and begin to protect data from attacks using quantum computers. GOST-cryptography (here we mean classical cryptography – approx. TASS) remains, just another additional level of reliability is added.
A striking international case is the protection of the channels of the host—to-host information system for Gazprombank. The bank has strategic channels through which it exchanges transactions with corporate clients. As part of a pilot project in February 2022, we integrated one of our products into the limited perimeter of the host-to-host system, increasing its security level. It should be noted here that if Russia is still catching up with the international community in quantum technologies, then we are on a par in postquants. So, we presented a case with Gazprombank in February, in June the Swiss BIS spoke about the need to study the technology, and in September the Bank of France told about the successful "pilot".
— When you say that you are embedded, what does it mean? — We have completely software solutions.
Simply put, it's software. Therefore, integration consists in the fact that we embed our solutions through existing client-side crypto providers.
Cryptoproviders are modules that allow performing cryptographic operations in information systems. When we talk about the same pilot project with Gazprombank, we are talking only about integration at the software level.
This may sound difficult for those who are not familiar with product development, so I'll explain a little. Solutions can be software, that is, software, or they can be hardware, that is, they require some kind of physical infrastructure. The latter, as a rule, are called "hard" or "hardware", contrasting software.
In order to provide quantum-stable protection, we do not need specialized equipment — we easily and quickly integrate software into the client's infrastructure. The range of possible integration points is very wide. We support various platforms: server solutions, mobile and web applications, we can even ensure the security of the "Internet of Things" device.
Working with hardware solutions, i.e. physical infrastructure, is also possible when there is a technology partner. For example, at the beginning of this year we took a course to support domestic computing processors. There are a number of companies in Russia that develop them: Baikal Electronics, MCST and others.
We decided not just to confirm that Russian processors are compatible with post-quantum cryptography, but to prove that the performance of post-quantum algorithms on domestic processors is comparable to foreign computing architectures. Now we have two completed pilots — just with "Baikal" and with "Elbrus" we have received certificates of compatibility of our solutions.
While working on these projects, we saw the potential for hardware acceleration. That is, in order for post-quantum algorithms to run faster, it is possible to provide their support at the level of processor commands or even develop additional cryptographic coprocessors. We have launched this track now. We can't tell you the details, because the NDA is very strict, but we will tell you exactly when we get the results, and this will be unprecedented for Russia.
— When you talk about the first projects, how do you feel?— I am very happy.
High in general.
Let me explain: the post-quantum cryptography market is just emerging. There are literally only a few cases in the world, and they are mainly from large laboratories within IT giants or large vendors and integrators. And we are the first in Russia to do this!
It is also very important that all work is team work. The project involves not only employees, but also customers who are ready to allocate a limited perimeter for piloting. Our customers and technology partners are the same pioneers as we are.
— Why is it important to be the first?— I've always wanted to.
My background is managerial positions in the field of creative industries. They have always been attracted by the opportunity to create something new by a small group of very inspired people. I've lived in this for many years. Gradually it became interesting — and how does the business of those who create the products themselves and order their design work in general?
I started going there: I went to project management, then to product management, then to business administration. As a result, I found the most charged people for me who want to do something first, have a serious scientific, engineering and business background. Such super—concentrated energy of people helps to live - day after day I am in this whirlpool, and it is very encouraging.
I came to qApp when the idea of the project had already arisen, but the company was at the very beginning of its journey. This was an initiative within the scientific group of Alexey Fedorov at the Russian Quantum Center, a specialist in quantum physics, one of the architects of the first general roadmap for quantum technologies, and later also the roadmap for quantum computing. There were several colleagues, there were the first prototypes, the results of research work. Together we continued to develop all this, scale the team and processes. Now there are already 20 employees in the team, all the most interesting things are ahead.
— Is it difficult for a person not from a scientific environment to interact with scientists?- yes.
But I came at a time when the initiative of the scientific group was supposed to go into operational activity and the team had already begun to expand. We started looking for engineers who are closer to me in the background than the academic environment. So far, we have a mix of scientists and engineers.
It was very difficult for me, but it was cool. I'm not talking about the complexity when the hands drop, but about the process when not everything is clear, but I really want to figure it out.
— You were talking about working closely with clients. And what is their interest? Why do they provide you with closed environments, why do they come to you at all?— In general, we identify several categories of clients for ourselves, but the most interesting and valuable is the one that is ready to pilot the technology not for the sake of a show case, but because it really thinks about the fact that encryption algorithms used in information systems require modernization.
Such a business wants to implement new cybersecurity solutions in order to be ready for new challenges. And often he thinks about it even before communicating with us.
In any case, our relationship with customers is built in several stages. First of all, we explain within the framework of workshops what a quantum threat is, what are the horizons of its implementation, what is post-quantum cryptography, what data requires protection in the first place, what are the positions of regulators in Russia and in other countries.
Next, we conduct an audit of information systems to understand where cryptography needs to be strengthened in the first place. Usually large companies have a lot of different information systems, a fleet of technologies, and they need to be prioritized, because neither they nor we have enough resources to take on everything at once.
The third stage is piloting. We jointly define the pilot contour, integration points, develop the technical specification for the integration project and the acceptance methodology.
Piloting can also take time, especially when it is necessary to provide support for the interface to the cryptoprovider, which we have not yet implemented. In the basic scenario, we are ready to deliver a solution without modifications "today". In case of synergy of requests from the client and our product strategy, we are ready to carry out work on finalizing our solutions.
Then we go into the following "pilots": we can scale the experience of the first pilot project, expand the perimeter of piloting, we can take other integration points.
— And who is our regulator?— Since 2019, the technical Committee for standardization "Cryptographic Protection of Information" (TC 26) has been responsible for the development of standards for post-quantum cryptography in Russia.
The leading role in the technical committee belongs to the Federal Security Service (FSB) of Russia as the main regulator in the field of cryptography. Our team is active participants in three of the four TC 26 subgroups for the development of standards for post—quantum cryptography.
In an optimistic forecast, the development of standards will be completed in the next two years. While we are piloting in limited circuits, so that as soon as the standard is adopted, we can quickly transfer customers' information systems to quantum-stable solutions and be ready not only technologically, but also in accordance with regulatory policy.
About post-quantum encryption algorithms, their selection process and the future
— What is the difference between quantum encryption and post-quantum encryption?— These are two completely different technologies.
The only thing they have in common is the ability to protect data from attacks using a quantum computer.
Quantum cryptography (or quantum key distribution, these are synonyms) is a method of information protection based on the use of fundamental laws of physics. The method works as follows: before transmitting encrypted data, the sender shares with the recipient a key — a random set of bits necessary for further decryption of the message. The key is transmitted using single photons either via optical fiber or through open channels. Thus, quantum cryptography is always about physics and about specialized infrastructure.
Post-quantum cryptography — about asymmetric encryption, about electronic signature and software. Roughly speaking, this is not physics, but mathematics.
As a company, we do not so much oppose our software products to quantum cryptography solutions, as we look for synergy. For example, quantum cryptography can be used for key distribution, and post—quantum cryptography can be used for secure key delivery to consumers who are not directly included in the quantum network. In addition, postquants can be useful for authentication between different segments of quantum networks or organizing access to keys, protecting auxiliary connections from MITM attacks. That is, summing up, it is possible to combine technologies using the most suitable one at different levels of work with data.
— Do I understand correctly that post—quantum cryptography is simpler and easier to embed into the company's information circuit?— 100%.
Firstly, the embedding time is less, and secondly, it is easier to install a software package and carry out the integration process than to install hardware complexes, organize their logistics, and so on. The process of delivering updates in software solutions is also much faster (for example, tomorrow we will have the implementation of a new and more reliable post-quantum algorithm, and our customers will receive it at the same moment).
— How does the black box function from the inside?— Our key product, which is the foundation for building new solutions, is a library of post—quantum algorithms.
In fact, this is a set of the most quantum-stable algorithms of a completely domestic implementation. There are interfaces for them that simplify the integration of these algorithms into various customer information systems.
— And why a set of algorithms, and, for example, not one algorithm?— Now there are several algorithms that are candidate algorithms for getting into the standard.
We support all of them, because it is not a fact that only one algorithm will be the standard.
— And who selects them as candidates to get into the standard? — The process of choosing the most quantum-stable algorithms has been going on in the world since 2017.
Internationally, it is overseen by NIST, the US National Institute of Standards and Technology.
The cryptographic community selects the most robust algorithms as part of the process. Any company or individual can submit their algorithm at the level of mathematical formulation. That is, it is not the final products that are served there, namely algorithms. The community evaluates the cryptographic strength of the algorithm, how stable it is in the projection of a quantum threat.
If the algorithm passes validation by the community and the curators of the contest, it goes to the next round. The rounds are distributed by years — conditionally, once every one and a half to two years, rounds occur, as a result of which the most quantum-stable algorithms remain. In 2017, about 80 algorithms were submitted, now there are less than ten left.
The process is very lively and mobile. Recently, there was a case with one of the finalist algorithms - the community proved that it can be attacked even with the help of classical computers.
In parallel with the international NIST process, the Russian Federation has its own process.
— By the way, you discovered an error in another finalist algorithm that you submitted for the competition.— It was an interesting and vivid story that proves the high level of our expertise.
A small team of Russian cryptographers looks after an international large process, analyzes the evidence of the secrecy of all algorithms and finds an error in one of the finalist algorithms that others have viewed.
However, our task is not only to review the algorithms of third-party authors for vulnerabilities, but to take the most stable algorithms and make their high-quality software implementation. Then we collect the algorithm implementations into a library and, based on this library, create final solutions both independently and jointly with technological partners.
— At the beginning of the interview, we talked about eight to ten years before the real quantum threat began. This is a big gap.— The gap may seem large if we believe that we have eight to ten years to protect information.
But as I said earlier, all these years an attacker can save data, even if encrypted with traditional cryptography, in order to use them later. If you don't prepare now, then it will be too late.
We are primarily about data protection with a long lifecycle, which means that now we need to pilot solutions, develop integration interfaces, develop standards and be ready.
For us, it's all about now, not about the future.
— I'm more about the fact that it's hard to sell now.— In general, the solutions of the deep tech segment — and this is the deepest it can be — are really difficult to explain to the audience at the first stage.
But the closer we are to the quantum threat, the more global technology companies begin to integrate post-quantum products, the higher the understanding of the criticality of this technology among customers and technology partners.
In less than ten years, we will definitely transform the Russian cybersecurity industry. We will not only bring post-quantum cryptography there and contribute to the emergence of standards, but we will protect key information systems of business and government with the help of our solutions.