Post-quantum encryption & access control for data-centric security
Cosmian covercrypt enables organizations to encrypt sensitive data with advanced security measures, ensuring long-term protection against both classical and quantum threats. It empowers a data-centric security approach, which prioritizes the reliability and integrity of data itself over the security of networks, servers, or applications.

Post-quantum security
Cosmian covercrypt combines classical and hybridized post-quantum encryption, ensuring long-term data protection against emerging quantum threats.

Fine-grained access control
With traceable encryption, Cosmian covercrypt restricts decryption to authorized users, enabling secure and auditable data access policies.

High performance & efficiency
Optimized for speed, Cosmian covercrypt achieves encapsulation in ~200 microseconds and decapsulation in ~600 microseconds, ensuring seamless integration.

Open-source & flexible
Built in Rust for high efficiency, Cosmian covercrypt is transparent, secure, and adaptable to various cryptographic environments.
What’s in Cosmian covercrypt?
Advanced encryption for the quantum era
Cosmian covercrypt delivers cutting-edge encryption technology, integrating classical and post-quantum security features for comprehensive protection.
-
- Hybrid post-quantum encryption: Combines classical and post-quantum algorithms for future-proof data security.
- Fine-grained access control: Restricts decryption to authorized users based on defined policies.
- Traceable encryption: Assigns unique decryption keys to each user for accountability and auditing.
What’s in Cosmian covercrypt?
Performance-driven cryptography
Cosmian covercrypt is engineered for high-speed encryption and decryption, ensuring minimal latency and seamless integration.
- Encapsulation in ~200 microseconds
- Decapsulation in ~600 microseconds
- Rust-based and open-source for high efficiency
Ready to secure your data against quantum threats?
What’s in Cosmian covercrypt?
Compliance & standardization
Cosmian covercrypt aligns with industry standards and regulatory requirements for cryptographic security.
- Implement ETSI Standard: ETSI TS 104 015
- Folloze ANSSI & BSI post-quantum hybridization recommendation
- Based on ML-KEM the NIST Standardized Post Quantum KEM
Available out of the box in Cosmian kms
Seamlessly integrated with Cosmian kms for easy deployment and centralized encryption management.

Access policies definition
Define precise decryption rights to ensure secure and controlled access to encrypted data.

Management of master and user decryption keys
Securely generate, store, and manage encryption keys with advanced lifecycle controls.

Encryption/decryption on the Fly
Instantly encrypt and decrypt data with high-performance processing for real-time security.
Top use cases using Cosmian covercrypt

Securing large repositories of data
Protect datalakes and vast amounts of sensitive information with scalable, post-quantum encryption, ensuring confidentiality and controlled access across large datasets.

Enforcing data-centric security
Embed encryption directly into data workflows, ensuring persistent protection regardless of storage, transfer, or processing environments.

Implementing post-quantum encryption
Safeguard critical data against future quantum threats with hybrid encryption, guaranteeing security over extended timeframes.

Implementing cryptoagility
Adapt seamlessly to evolving cryptographic standards by integrating flexible, hybrid encryption mechanisms that future-proof data security.