Post-Quantum Cryptography & Quantum Security

We design security solutions based on post-quantum cryptography and Quantum Key Distribution to protect data from today's and tomorrow's quantum threats. 100% Italian startup.

Post-Quantum Cryptography Quantum Key Distribution ML-KEM-768 (Kyber) NIST FIPS 203 100% Made in Italy

Our areas of expertise

Research, development, and implementation of quantum-safe security solutions for enterprises and institutions.

🔐

Post-Quantum Cryptography

We implement NIST-standardized PQC algorithms: ML-KEM-768 (Kyber) for encryption and ML-DSA (Dilithium) for digital signatures. Hybrid classical + PQ solutions for a gradual and secure transition.

ML-KEM-768 ML-DSA FIPS 203 / 204
🔗

Quantum Key Distribution

We design communication systems with quantum key distribution (QKD) based on quantum entanglement. Security guaranteed by the laws of physics, not computational complexity.

QKD ETSI QKD Entanglement
💬

Secure messaging

We develop end-to-end encrypted communication platforms with post-quantum cryptography, P2P communication via WebRTC, available as a customizable white-label solution.

🛡️

Cyber & PQC Consulting

We assist enterprises and public institutions in migrating to post-quantum cryptography: crypto-agility assessment, transition roadmap, technical training, and NIST/ENISA compliance.

🎓

Quantum Training

Corporate training courses on quantum technologies across the board: quantum-resistant cryptography, Quantum AI, Quantum Computing, and Quantum Programming. Customized programs for C-level executives, technical teams, and developers.

PQC Quantum AI Quantum Computing Quantum Programming
📱

SDK & Integrations

We provide SDKs and libraries to integrate post-quantum cryptography into existing applications: mobile, desktop, web, and IoT. Compatible with OpenSSL and industry standards.

Our products

Market-ready solutions built on our post-quantum cryptography expertise.

🛡️
Qessage
Quantum-Safe Messaging

Secure messaging app with post-quantum end-to-end encryption (hybrid ML-KEM-768), P2P communication via WebRTC, QKD integration, quantum-safe file sharing. Available for Android, iOS, and Web, also as a white-label solution.

E2E Post-Quantum P2P WebRTC QKD Ready White-label RASP Protection Cross-platform
🔧
Q2Pi SDK
Post-Quantum Cryptography Toolkit

Libraries and SDKs to integrate post-quantum cryptography into your applications. Support for ML-KEM-768 (Kyber), ML-DSA (Dilithium), hybrid encryption, and key exchange. Compatible with OpenSSL, available for C, Java, Dart/Flutter, and JavaScript.

ML-KEM-768 ML-DSA (Dilithium) Hybrid RSA/ECDH + PQ OpenSSL Multi-language
☁️
QCloak
Quantum-Safe Cloud Storage

Quantum-safe cloud storage platform. Files are encrypted with AES-256 and keys protected by post-quantum algorithms (ML-KEM-768) before upload. Zero-knowledge: not even the provider can access your data. Secure sharing with hybrid key encapsulation.

Zero-Knowledge AES-256 + PQC Secure Sharing GDPR Compliant On-premise / Cloud
📜
QPKI
Post-Quantum PKI

Post-quantum public key infrastructure. QPKI issues digital certificates based on NIST post-quantum algorithms: ML-KEM-768 (Kyber) for key encapsulation and ML-DSA (Dilithium) for digital signatures. X.509 compatible, ready for PQ migration of existing infrastructures.

Kyber Certificates Dilithium Certificates X.509 Compatible Full CA / RA PQ Migration

Why Quantum2Pi

Vertical expertise, proprietary technology, European sovereignty.

🇮🇹

100% Italian, 100% European

Code, cryptography, and infrastructure entirely developed in Italy. No dependency on non-EU big tech. GDPR compliant, no CLOUD Act or FISA obligations.

🎓

Academic and industrial team

Founders with PhDs in mathematics, computer science, and physics. Over 20 years of experience in cryptography, cybersecurity, and enterprise software development.

📜

NIST and ETSI standards

We exclusively implement standardized algorithms (FIPS 203, 204, 205) and ETSI QKD-compliant protocols. No proprietary or unverified cryptography.

From prototype to production

Not just research: our products are live on app stores and in use by real companies. Applied post-quantum cryptography, not theoretical.

🔗

Hybrid PQC + QKD approach

Unique in combining algorithmic post-quantum cryptography with physics-based Quantum Key Distribution. Dual protection: mathematical and quantum.

🤝

White-label and partnerships

All our solutions are available as white-label or SDK for integration. We collaborate with system integrators, ISVs, and public institutions.

Who works with us

We collaborate with companies, institutions, and innovation centers that share our vision on quantum security.

🏛️

MEF — Italian Ministry of Economy and Finance

Institutional collaboration on cybersecurity and advanced cryptography projects for central Public Administration.

🛰️

Tolemaica

Technology partnership on advanced security and tracking solutions with post-quantum cryptography integration.

🏗️

Casa delle Tecnologie Emergenti di Matera

Collaboration with the Matera innovation hub on research and experimentation projects in quantum computing and quantum security.

🌍

Deep South

Strategic partnership for the development and diffusion of advanced cybersecurity solutions and quantum technologies in Southern Italy and the Mediterranean.

The team

Founders with academic and industrial backgrounds in cryptography, mathematics, and cybersecurity.

Ugo Chirico
Ugo Chirico
CEO & CTO
Cybersecurity and cryptography expert with 20+ years of experience. Architect of Qessage and Quantum2Pi's PQC systems. Speaker at OpenSSL Conference 2025.
Salvatore Cuomo
Salvatore Cuomo
CSO
Professor of Numerical Analysis at the University of Naples Federico II. PhD in Applied Mathematics and Computer Science. Expert in Mathematics for AI, 190+ scientific publications.

Contact us

For a demo, proof-of-concept, or to discuss how to protect your data with post-quantum cryptography.

📧

Email

info@quantum2pi.com
🌐

Website

www.quantum2pi.com
💬

Qessage

qessage.com