Architecture Sneak Peek:
Why we are upgrading our ZTNA from PKI to a dynamic PSK architecture.
Why we are upgrading our ZTNA from PKI to a dynamic PSK architecture.
By NJ Janse van Resburg
Founder | R&D Designer | Chief Technology Officer
April 19 2026
The cybersecurity industry's transition to Post-Quantum Cryptography (CNSA 2.0) is exposing real performance bottlenecks.
Asymmetric primitives like ML-KEM and ML-DSA introduce significant packet overhead and CPU cost—especially at scale.
For the next iteration of WildHorse Enterprise, we chose not to inherit that complexity into the runtime architecture—and instead shifted trust establishment out-of-band.
While our earlier prototypes explored hybrid post-quantum key exchange, this iteration focuses on a symmetric-first architecture to achieve the same security objectives with significantly lower operational overhead.
Instead of traditional PKI, we are moving to a hardware-backed, dynamically rotating PSK model, designed to overcome the traditional limitations associated with static PSK models.
Our engine is built on:
🔹 Deterministic State (HMAC-SHA-512)
Enabling continuous, mathematical key rotation without reliance on repeated asymmetric negotiation.
🔹 Authenticated Encryption (AES-256-GCM)
High-performance, widely trusted authenticated encryption for data-in-transit.
🔹 Strict Key Zeroization & Forward-State Isolation
Session state is destroyed on termination and cannot be reconstructed.
By making keys ephemeral and continuously evolving, the system is designed to achieve Level 5 (256-bit symmetric) security strength—without the multi-kilobyte overhead of post-quantum asymmetric handshakes.
This allows us to achieve:
🛡️ Level 5-equivalent (256-bit symmetric) quantum-resistant security strength
📜 CNSA 2.0-aligned cryptographic posture
⚡ High-performance operation without CPU-induced latency
High-assurance security shouldn’t collapse under its own weight.
We’re deep in the codebase now—early metrics are promising
Stay tuned.