COMPANY NEWS

ALYA Advisory showcased two KAZ-ready products at the International Conference and Exhibition on Post Quantum Cryptography Technologies 2025 (ICE-PQC).

ALYA Advisory showcased two KAZ-ready products at the International Conference and Exhibition on Post Quantum Cryptography Technologies 2025 (ICE-PQC).

 

12th-13th November 2025, International Conference and Exhibition on Post Quantum Cryptography Technologies 2025 (ICE-PQC) was successful held in Universiti Putra Malaysia, Serdang, Malaysia. ICE-PQC 2025 unites global researchers, cryptography experts, and technology leaders to explore advancements in Post-Quantum Cryptography (PQC). Learn from pioneers, engage in deep technical sessions, and collaborate to build a secure quantum-resilient future.

 

At the exhibition, ALYA showcased two KAZ-ready products — a database encryption product and a security gateway product — to all attendees. Both products have undergone in-depth integration and adaptation for the KAZ PQC algorithm, an independently developed cryptographic solution from Malaysia, and are the first products of their kind globally to support the KAZ algorithm. The compatibility with KAZ-PQC not only significantly enhances the security of cryptographic algorithms, but also marks a critical milestone in building Malaysia’s independent and controllable cybersecurity ecosystem, providing robust and reliable cybersecurity protection for the country’s critical infrastructure entities.

Database Encryption System: The research contents include the construction of a Database Encryption Framework Deeply Integrated with Malaysia PQC KAZ-algo, Searchable Encryption and SQL rewriting rules for encrypted data.This research combines the KAZ algorithms with database encryption to create a “secure vault” for core data, establishing an independent permission control system. It leverages authentication, access control, auditing, and encryption for multi-layered security.

PQC adoption in NGFW/IPS/VPN security Gateway: The research contents include the application of the KAZ-SIGN PQC algorithm in PKI, usage of KAZ-SIGN-issued certificates in the IKE protocol, and application of the KAZ-SIGN algorithm in the TLS protocol.