Encryption and electronic signature

Asymmetric and Post-Quantum Cryptography

Implementation of the latest cryptographic algorithms (PQC, ECC, RSA 4096) into real IT products.
Find out more

Trustworthiness, immutability and authorship of digital data

Sensitive contracts, banking transactions, confidential information. Everything in the electronic world can easily be stolen, intercepted or subsequently altered. The use of applied cryptography is a fundamental pillar of a trusted digital world.



We work with state-of-the-art algorithms – Post-Quantum cryptography (PQC), Asymmetric Cryptography (RSA) and Elliptic Curve Cryptography (ECC).



We transfer complex mathematical formulas into real products with practical use.



We have our own dedicated team of cryptographers who follow the latest trends and translate them into customer solutions.

Asymmetric cryptography (public key cryptography)

The essence is the use of public and private keys, where the public key is available and is used to encrypt the message. Conversely, a private key is a cryptographic secret that is stored on a secure resource (smart card, HSM module) and can only be accessed by the recipient of the message.

Practical solution of asymmetric cipher is our main activity. By default, we use not only the recommended cryptographic algorithm RSA 4096 (principle of factorization of prime numbers), but also the algorithm of elliptic curves ECC.

Fundamental user scenarios for cryptography

  • Electronic signature
  • Electoral seal
  • Encryption of outgoing emails
  • Encryption of sent data
  • Encryption of transaction commands and logs
  • …and many more

Our tools use the latest cryptographic algorithms – RSA and ECC. We are actively monitoring the development of Post-Quantum Cryptography (PQC) and preparing for its implementation.

Post-Quantum Cryptography (PQC)

Cryptography Resistant to Quantum Computer Threats

The threat of quantum computers based on superconductors, quantum mechanics and qubits is becoming increasingly real. In 2021, the 127-qubit IBM Eagle universal processor was introduced. According to experts, the first functional quantum computer will be built within 20 years.

Real threat to public key systems

A quantum computer will vastly speed up computing power and can break commonly used encryption algorithms for electronic signature and document encryption. The banking sector and public administration are particularly at risk.

Applied cryptography in ProID tools

  • We use the appropriate type of algorithm for a specific purpose
  • We pay attention to its safety and correct parameters
  • We monitor the methods of attacks and respond to them accordingly
  • We follow procedures for flawless implementation and correct use in practice
  • We follow the recommendations of world authorities for the security of cryptographic algorithms – NIST, ETSI and EITF
  • We closely monitor the requirements and recommendations of cryptographic protection in the field of cyber security

Our Preparation for Post-Quantum Cryptography

  • We actively monitor the selection and development of recommended cryptographic algorithms
  • We prepare migration plans and test them in a real environment
  • We have launched the project Integration of PQC algorithms for audit records
  • We have integrated PQC libraries without any significant technical limitations

Our projects

Are you interested in our solution? Contact us

    [honeypot honeypot-453]

    By filling in the form you agree to the processing of your personal data.