Quantum-Proof VPP: Bringing Post-Quantum Security to the Data Plane

11/05/2026

The quantum computing era is not a distant theoretical concern – it is an engineering reality that network architects and security teams need to address as soon as possible.

At the intersection of high-performance, open-source networking and cutting-edge post-quantum cryptography, experts from PANTHEON.tech and Qrypt have joined forces.

This post introduces our Quantum-Proof VPP (QP-VPP) project, a proof-of-concept that leverages PANTHEON.tech’s expertise in the FD.io VPP data plane to integrate Qrypt’s BLAST protocol – a quantum-safe key exchange solution – via WireGuard, ensuring cryptographic resilience for the data plane.

If you want to go straight to the point, visit our public repository for this project.

[The Problem] Asymmetric Encryption in the Post-Quantum Era

Today’s VPN and secure-tunnel solutions (including WireGuard) rely on asymmetric cryptography for key exchange. Algorithms such as Diffie-Hellman (DH) and elliptic-curve variants (ECDH) are mathematically hard problems that classical computers cannot crack in a practical timeframe.

A sufficiently powerful quantum computer running Shor’s algorithm could solve these problems efficiently. This is not just a problem for the future – it is a problem right now, thanks to a threat model known as “Harvest Now, Decrypt Later” (HNDL).

Bad actors capture encrypted traffic today, store it, and decrypt it once quantum hardware matures. For any sensitive communication – government, finance, telco – this is an unacceptable risk.

How WireGuard Addresses Quantum Resistance

WireGuard is a modern VPN protocol praised for its simplicity, performance, and strong cryptographic defaults. Unlike older protocols like IPsec or OpenVPN, WireGuard was designed with a minimal attack surface in mind.

WireGuard’s designers were aware of the quantum threat and included a mechanism specifically to address it: the Pre-Shared Key (PSK).

When a PSK is configured between two WireGuard peers, it is mixed into the handshake key derivation using a symmetric key-based construction. Symmetric cryptography (like AES-256, used for the PSK) is quantum-resistant in a practical sense.

Grover’s algorithm on a quantum computer only reduces its effective key strength by half, leaving a 256-bit key with 128 effective bits of quantum security, which remains computationally infeasible to break. But there is a catch, as always.

The PSK Distribution Problem: Why Symmetric Keys Are Hard to Share

A quantum-proof tunnel is only as strong as the method used to distribute its pre-shared key. QP-VPP provides an alternative to traditional PQC key-encapsulation mechanisms (KEMs) by leveraging Qrypt’s quantum-derived entropy for PSK synchronization, avoiding the computational overhead of some software-based PQC algorithms.

The PSK must be identical on both endpoints of a WireGuard tunnel. This sounds simple, but it introduces the very problem that asymmetric cryptography was invented to solve: how do you securely share a secret between two parties, over an untrusted network, without an attacker intercepting it?

If you distribute the PSK using a classical asymmetric channel – for example, TLS-encrypted configuration management – you have re-introduced the quantum vulnerability through the back door. An adversary using HNDL can intercept the PSK distribution and decrypt it later. You have solved nothing.

Manual PSK distribution (e.g., out-of-band USB delivery, printed key material) is operationally impractical at scale and does not support automated key rotation. For network infrastructure that needs to rotate keys frequently – a strong security practice – this approach simply does not work.

The Solution: Quantum-Safe Key Synchronization via Qrypt BLAST Protocol

The key insight is that distributing a symmetric key securely requires a fundamentally different approach than classical public-key cryptography. This is where quantum entropy and the Qrypt BLAST protocol enter the picture.

Qrypt provides a Quantum Key Distribution (QKD)-inspired service built on quantum random number generation (QRNG). Instead of computing a shared secret mathematically, both endpoints independently derive identical key material from a quorum of multiple independent Digital Quantum Key Distribution (DQKD) servers.

The BLAST (Broadband Lightweight Asynchronous Synchronization Technology) protocol is Qrypt’s mechanism for synchronizing this entropy between endpoints:

  • One endpoint acts as the initiator and generates an AES key along with cryptographic metadata.
  • The metadata (not the key itself) is shared with the peer endpoint – this metadata is safe to transmit, even over a potentially compromised channel.
  • The BLAST protocol synchronizes key material by transmitting cryptographic metadata rather than the raw PSK, ensuring that the key is only reconstructed within the secure boundaries of the SDK, on each endpoint. 
  • A configurable Time-To-Live (TTL) limits how long the metadata remains valid, enabling automatic key rotation without re-transmitting secrets.

This design ensures that the raw PSK is never exposed on the data plane. Instead, the BLAST protocol uses metadata to synchronize key derivation between endpoints using out-of-band quantum entropy.

For an attacker, this effectively neutralizes HNDL threats, even if the metadata is intercepted today, the key cannot be reconstructed without simultaneous, unauthorized access to the secure quantum entropy stream.

QP-VPP Demo Description

The QP-VPP demo validates the end-to-end operation of a quantum-proof VPN tunnel, within the high-performance FD.io VPP data plane.

  • Quantum Key Synchronization: Two containerized VPP WireGuard endpoints (an initiator and a synchronizer) independently derive an identical symmetric Pre-Shared Key (PSK) from quantum entropy, using Qrypt’s BLAST protocol. This synchronization occurs by securely sharing cryptographic metadata – not the raw key – neutralizing the “Harvest Now, Decrypt Later” threat.
  • Automated Key Rotation: The endpoints are configured for continuous, automated and fast PSK rotation, every 10 seconds.
  • Tunnel Resilience: The VPP WireGuard interface accepts and uses the newly derived key as the PSK, ensuring the tunnel stays up and passes traffic across rotation boundaries with zero packet loss.

QP-VPP Demo Topology

Engineering Better Networks – Today and Tomorrow

At PANTHEON.tech, we recognize that security is not a static goal, but a continuous commitment. Protecting your data requires solutions that are robust enough for today’s challenges, while remaining adaptable for the threats of tomorrow.

The QP-VPP project represents our proactive approach to this continuous evolution. By exploring quantum-resistant tunneling within the FD.io VPP ecosystem, we are developing the building blocks for high-performance, future-proof network infrastructure. Our goal is to ensure that – as the cryptographic landscape shifts – your data remains protected by the most advanced engineering available.

Whether you are evaluating post-quantum cryptography for your network stack, looking to extend VPP’s security capabilities, or simply exploring where quantum-safe networking is headed – we invite you to explore the demo, review the code, and reach out.

Interested in deploying quantum-proof networking in your VPP environment? Contact us or explore our FD.io VPP expertise at pantheon.tech.

Related Articles

Vector Packet Processing 104: gRPC & REST

Vector Packet Processing 104: gRPC & REST

Welcome back to our Vector Packet Processing implementation guide, Part 4. Today, we will go through the essentials of gRPC and REST and introduce their core concepts, while introducing one missing functionality into our VPP build. This part will also introduce the...

read more
Vector Packet Processing 103: Ligato & VPP Agent

Vector Packet Processing 103: Ligato & VPP Agent

Welcome back to our guide on Vector Packet Processing. In today's post number three from our VPP series, we will take a look at Ligato and its VPP Agent. Since the original version of this article, the Ligato project has consolidated. The VPP Agent and CN-Infra remain...

read more
Vector Packet Processing 101: VPP Plugins & Binary API

Vector Packet Processing 101: VPP Plugins & Binary API

In the first part of our new series, we will be building our first VPP platform plug-in, using basic examples. We will start with a first-dive into plugin creation and finish with introducing VAPI into this configuration. If you do not know what VPP is, please visit...

read more