Skip to content

Three doors, one solution

Audience: CIOs, CTOs, CISOs, Enterprise Architects, decision makers evaluating ANKASecure©

Reading time: 12 minutes


The thesis

Three different concerns lead enterprises to ANKASecure©. They look like three different problems. They resolve to the same architectural shift.

flowchart TB
    P1["🎯 Door A<br/>Enterprise crypto control"]
    P2["⚛️ Door B<br/>Post-quantum readiness"]
    P3["🛡️ Door C<br/>Cryptographic sovereignty"]

    SOL["🏛️ ANKASecure©<br/>Cryptographic Control Plane"]

    BENEFITS["✅ All three buyers receive all three benefits"]

    P1 --> SOL
    P2 --> SOL
    P3 --> SOL
    SOL --> BENEFITS

    style P1 fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
    style P2 fill:#d5f5e3,stroke:#1e8449,stroke-width:2px
    style P3 fill:#fdebd0,stroke:#d68910,stroke-width:2px
    style SOL fill:#85c1e9,stroke:#1a5276,stroke-width:3px
    style BENEFITS fill:#abebc6,stroke:#1e8449,stroke-width:2px

This page walks each buyer through their entry concern, the structural problem behind it, and how the platform resolves it. Each path culminates in the same architectural decision: moving cryptography from embedded code to governed infrastructure.


Door A — The enterprise crypto control buyer

"How do I govern cryptography across my entire enterprise without modifying every application?"

The buyer

CIOs, CTOs, and Enterprise Architects responsible for hundreds or thousands of services across their organization. They have visibility into the cost of cryptographic change.

The pain

Their cryptographic environment looks like this:

  • Crypto sprawl. Each team chose its own algorithms, libraries, key sizes
  • Hardcoded everywhere. Algorithms live in Java, Go, Python, .NET, Node — embedded in code
  • No central inventory. No one can answer "how many systems use RSA-2048?"
  • Audit is impractical. Demonstrating cryptographic posture requires inspecting every application
  • Changes are projects. A vulnerability in an algorithm triggers months of coordinated engineering
  • Governance is aspirational. Policies exist on paper; enforcement happens application by application

The cost of cryptographic change is so high that the organization rarely changes anything proactively. Cryptographic decisions made years ago persist by inertia.

The structural problem

This is not a discipline problem. It is an architectural problem. When cryptographic logic lives inside application code, every cryptographic transition becomes a distributed engineering effort. There is no infrastructure layer that can govern the behavior centrally.

Other infrastructure capabilities have already abstracted away from applications:

Capability Was Became
Identity Embedded credentials in apps Identity providers (Okta, Auth0, Ping)
Networking Per-device configuration Software-defined networking
Secrets Configuration files Vault platforms (HashiCorp Vault, AWS Secrets Manager)
Cryptography Embedded library calls Cryptographic Control Plane

The historical pattern is clear. Cryptography is the next infrastructure capability to abstract.

What ANKASecure© provides

Applications stop selecting algorithms. They reference cryptographic intent through a stable identifier (a Key ID) and the control plane resolves the actual algorithm based on policy. When the policy changes, every application reflects the change immediately — without redeployment.

flowchart LR
    subgraph BEFORE["Before — embedded cryptography"]
        APP1["App<br/>RSA-2048"]
        APP2["App<br/>RSA-3072"]
        APP3["App<br/>ECDSA-P256"]
        APP4["App<br/>RSA-2048"]
    end

    subgraph AFTER["With ANKASecure©"]
        APPS["Applications<br/>express intent only"]
        CCP["Cryptographic<br/>Control Plane"]
        POL["Active policy"]
        ENG["Cryptographic<br/>execution"]
        APPS --> CCP
        POL --> CCP
        CCP --> ENG
    end

    BEFORE -.->|"architectural shift"| AFTER

    style BEFORE fill:#fadbd8,stroke:#c0392b
    style AFTER fill:#d5f5e3,stroke:#1e8449

The bonuses they receive

  • PQC readiness arrives by default. New algorithms are introduced through policy. ML-KEM, ML-DSA, hybrid schemes — all available without rewriting applications.
  • Sovereign third-party exchange becomes possible. The same control plane that governs internal cryptography can mediate cryptographic operations with third parties — keys never leave the owner's domain.

The deeper architectural treatment is in The Cryptographic Control Plane. The maturity progression is in The Cryptographic Maturity Model.


Door B — The post-quantum readiness buyer

"How do I migrate to post-quantum cryptography without rebuilding every application?"

The buyer

CISOs, security architects, and compliance leads. They have read the NIST FIPS 203/204/205 standards. They understand the harvest now, decrypt later threat. They have regulatory pressure (CNSA 2.0, EU mandates, sector guidance) that gives them a deadline.

The pain

The migration from RSA and ECC to ML-KEM and ML-DSA is not a single algorithm swap. It is a sustained, multi-year transition that must:

  • Support hybrid coexistence. Classical and post-quantum algorithms operate side by side during transition
  • Cover heterogeneous environments. Different applications, languages, and frameworks all need to migrate
  • Preserve operational continuity. No outages, no compatibility breaks
  • Meet regulatory deadlines. Mandates are firming up, not relaxing
  • Address long-retention data. Data encrypted today may need re-encryption before quantum capabilities mature
  • Adapt to evolving standards. PQC standards themselves are still maturing

Without an abstraction layer, every application that touches cryptography becomes a migration project of its own. With dozens or hundreds of such applications, the timeline becomes unworkable.

The structural problem

A migration of this magnitude cannot be executed application by application. The organization needs an architectural layer that:

  • Resolves cryptographic intent into algorithm execution
  • Supports multiple algorithm families simultaneously
  • Allows hybrid (classical + PQC) deployment
  • Lets policy decisions propagate without code change
  • Re-encrypts large data stores without application participation

This is exactly the cryptographic control plane.

What ANKASecure© provides

PQC adoption becomes a policy decision, not an engineering project:

  • The platform supports ML-KEM, ML-DSA, SLH-DSA, Falcon, and hybrid composite schemes
  • Hybrid (classical + PQC) coexistence is the default deployment mode
  • Algorithm activation and deactivation happen through policy updates
  • Streaming re-encryption migrates large data stores without application participation
  • New PQC standards integrate into the platform's algorithm catalog without affecting consumers
flowchart TB
    subgraph TRADITIONAL["❌ Without abstraction"]
        T1["Identify all RSA usage"]
        T2["Modify each application"]
        T3["Coordinate redeployment"]
        T4["Validate compatibility"]
        T5["Migrate encrypted data manually"]
        T6["Repeat per application"]
        T1 --> T2 --> T3 --> T4 --> T5 --> T6
    end

    T6 -.->|"architectural shift"| C1

    subgraph CCP["✅ With ANKASecure©"]
        C1["Update algorithm policy"]
        C2["Policy propagates to all consumers"]
        C3["New algorithm active enterprise-wide"]
        C4["Streaming re-encryption migrates data"]
        C1 --> C2 --> C3 --> C4
    end

    style TRADITIONAL fill:#fadbd8,stroke:#c0392b,stroke-width:2px
    style CCP fill:#d5f5e3,stroke:#1e8449,stroke-width:2px

The bonuses they receive

  • Enterprise-wide cryptographic governance. The control plane that enables PQC migration is the same one that governs all enterprise cryptography. Crypto sprawl resolves alongside the PQC transition.
  • Sovereign third-party exchange. Post-quantum-protected exchanges with third parties operate under the same governance model — without surrendering keys to counterparties.

For deeper treatment of the PQC narrative, see The Cryptographic Control Plane. For the operational framework, see The CAPA framework, particularly Pillar 1 — Crypto-Agility.


Door C — The cryptographic sovereignty buyer

"How do I share data with third parties without losing control of my keys?"

The buyer

CISOs and risk leaders in industries with intense third-party dependencies: financial services with BPOs and embossing providers, telecommunications with roaming partners, healthcare with labs and insurers, government with contractors and binational programs.

The pain

Sharing data with a third party currently means surrendering cryptographic control:

flowchart LR
    A["🏢 Your organization<br/>(data owner)"] -->|"key delivery /<br/>cleartext data"| B["🤝 Third party<br/>(full control over your data)"]

    B --> R1["❌ No visibility into when<br/>or how data is used"]
    B --> R2["❌ Cannot revoke access<br/>in real time"]
    B --> R3["❌ No auditable evidence<br/>of usage"]
    B --> R4["❌ Key lives outside<br/>your domain"]

    style A fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
    style B fill:#fadbd8,stroke:#c0392b,stroke-width:2px
    style R1 fill:#fef9e7,stroke:#c0392b
    style R2 fill:#fef9e7,stroke:#c0392b
    style R3 fill:#fef9e7,stroke:#c0392b
    style R4 fill:#fef9e7,stroke:#c0392b

Once a key (or cleartext data) leaves the owner's domain, the following become impossible without bilateral coordination:

  • Real-time revocation of access
  • Knowing the exact scope of data consumption
  • Producing forensic evidence of individual operations
  • Limiting use to specific batches, time windows, or operation counts

The risk is structural, not procedural. Diligent third parties may follow agreements scrupulously — but the architecture itself does not enforce them.

The regulatory amplifier

Regulatory frameworks make the data owner accountable for what third parties do with their data:

Regulation What it requires
DORA (EU) Third-party ICT risk management with evidence of controls
PCI-DSS 4.0 Key custody and segregation; control over service providers
SOX (USA) Controls over financial systems with complete traceability
GDPR Controller accountability over processors
CNSA 2.0 (USA NSA) Transition to quantum-resistant algorithms

The legal responsibility cannot be delegated to the third party. Yet the architectural model — surrendering keys — places control with the third party. The mismatch is the source of risk.

The structural problem

The traditional model shares keys. ANKASecure© inverts this: it shares capabilities. The third party is no longer given the means to perform cryptographic operations; it is given the right to invoke them, mediated and audited.

flowchart TB
    subgraph TRADITIONAL["❌ Sharing a key"]
        direction LR
        T1["Data owner"] -->|"delivers key"| T2["Third party"]
        T2 --> T3["Possesses cryptographic material"]
        T2 --> T4["Uses it whenever and<br/>however they want"]
        T2 --> T5["Revocation requires<br/>bilateral coordination"]
    end

    subgraph ANKASECURE["✅ Sharing a capability"]
        direction LR
        A1["Data owner"] -->|"grants capability"| A2["Control Plane"]
        A2 -->|"mediated invocation"| A3["Third party"]
        A3 --> A4["Only what was authorized,<br/>when it was authorized"]
        A2 --> A5["Immediate revocation<br/>without coordination"]
        A2 --> A6["Every execution logged<br/>in owner's domain"]
    end

    TRADITIONAL -.->|"paradigm shift"| ANKASECURE

    style TRADITIONAL fill:#fadbd8,stroke:#c0392b,stroke-width:2px
    style ANKASECURE fill:#d5f5e3,stroke:#1e8449,stroke-width:2px

What ANKASecure© provides

Dimension Traditional model With ANKASecure©
What is shared The key A controlled capability
Who holds key material The third party Always the data owner
Revocation Bilateral coordination Immediate from the control plane
Audit Depends on third-party reporting Complete evidence in owner's domain
Usage scope Unrestricted Policy-bounded per invocation

Concrete scenarios showing how this materializes — card issuance with multiple providers, BPO collections without bulk file transfer — are in Reference scenarios.

The bonuses they receive

  • PQC readiness. Sovereign exchange runs over the same control plane that supports post-quantum algorithms. Third-party exchanges can adopt PQC by policy.
  • Enterprise crypto governance. The control plane that mediates third-party operations is the same one that governs internal cryptography. Crypto sprawl is resolved.

For the detailed treatment of this principle, see Cryptographic sovereignty.


Why all three doors lead to the same place

The three concerns appear different, but they share a structural root.

Concern Underlying need
Enterprise crypto control An infrastructure layer that governs cryptography across many systems
Post-quantum readiness An infrastructure layer that abstracts algorithm selection from application code
Cryptographic sovereignty An infrastructure layer that mediates cryptographic operations without surrendering keys

The "infrastructure layer that governs cryptography" is the Cryptographic Control Plane. Each buyer is describing a different facet of the same architectural object.

flowchart TB
    NEED["The shared architectural need:<br/>cryptography as governed infrastructure,<br/>not embedded code"]

    F1["Facet 1<br/>Enterprise governance"]
    F2["Facet 2<br/>Algorithm abstraction"]
    F3["Facet 3<br/>Mediated capabilities"]

    NEED --> F1
    NEED --> F2
    NEED --> F3

    F1 -.-> CCP["Cryptographic Control Plane"]
    F2 -.-> CCP
    F3 -.-> CCP

    style NEED fill:#85c1e9,stroke:#1a5276,stroke-width:2px
    style CCP fill:#d5f5e3,stroke:#1e8449,stroke-width:3px

The compound benefit

A buyer entering through any one door receives the capabilities the other two doors describe. This is not a marketing claim — it is a consequence of the architecture.

Buyer enters through They explicitly need They also receive
Door A — control Enterprise governance + PQC readiness + sovereign exchange
Door B — PQC Algorithm abstraction + enterprise governance + sovereign exchange
Door C — sovereignty Mediated capabilities + enterprise governance + PQC readiness

The control plane is the same in all three cases. The framework that operationalizes it (CAPA) is the same. The deployment organization model (the twelve entities) is the same.


Whatever door brought you here, the next step depends on what you want to understand:

If you want to… Read…
Understand the architectural shift in depth The Cryptographic Control Plane
Learn the operational framework The CAPA framework
Map your current state and target state The Cryptographic Maturity Model
Explore the third-party sovereignty principle Cryptographic sovereignty
See concrete enterprise scenarios Reference scenarios
Understand the deployment organization model Deployment organization model