Sign in
Your Saved List Partners Sell in AWS Marketplace Amazon Web Services Home Help


By: QST-VPN Latest Version: QST-VPN 1.0.0

Product Overview

Traditional key exchange algorithms - including Diffie-Hellman, RSA and Elliptic Curve Cryptography - are known to be vulnerable to attack by a sufficiently advanced quantum computer. This quantum computer does not exist yet, but experts believe one will be created in the next 10-15 years. QST-VPN will protect your data once this happens and beyond. The risk to data does not start in 10 years. Someone could intercept your data today, and store it for future decryption. How long does your data need to be secure for? If the answer is more than five years, the time to switch to QST-VPN might be today.

QST-VPN uses Post Quantum secure algorithms and the trusted open source VPN library OpenVPN to secure your data.


QST-VPN 1.0.0




Operating System

Linux/Unix, Ubuntu 20 LTS

Delivery Methods

  • Amazon Machine Image

Pricing Information

Usage Information

Support Information

Customer Reviews