Healthcare

Medical records protected for decades — from DICOM to telehealth APIs

Medical records today (imaging, genomics, ECG) must be retained 25-99 years. If encrypted with RSA or ECDSA today, an attacker can capture and decrypt them once a sufficiently large quantum computer exists. The patient is born today, the attack happens in 2035+. The only defense is migrating to post-quantum cryptography before Q-Day.

25-99 yrs
DICOM retention
42%
typical compression
ISO 27799
compliance
<50ms
PQC overhead
PosQuantum · Healthcare

Three real scenarios where PosQuantum acts

1

Long-retention DICOM archive

Context

University hospital with ~4 PB of DICOM images (X-ray, CT, MRI) accumulated over 12 years. Requirement: minimum 25-year retention for pediatrics, 5 years for adults, and immediate clinician access.

Risk

Traditional storage encrypted with AES-256 + key wrapped by RSA-2048. Q-Day breaks RSA and exposes symmetric keys.

PosQuantum solution

PUCE Archive creates signed manifests (Ed25519 today, Dilithium3 migration on SDK upgrade) pointing to blobs already in R2. Lossless compression applied before upload (typical 18-42% savings on DICOM). Periodic automatic verification guarantees integrity. Keys wrapped with ML-KEM-1024 via PQSL.

2

Cross-border telemedicine (EU + Switzerland)

Context

Video-consultation SaaS platform. 40k physicians, 2M patients, data subject to GDPR (EU) and nLPD (CH). Peaks of 8k concurrent sessions.

Risk

Current TLS 1.3 uses ECDHE-X25519 for handshake — breakable by a quantum computer. Audio/video stream can be harvested by state MITM and decrypted retrospectively.

PosQuantum solution

PUCE Stream with PQSL-encrypted segments (ML-KEM-768 hybrid X25519+Kyber handshake). PQSL middleware in front of Express API maintains rate-limit + PQC headers. Consultation records go to PUCE Archive (7-year legal retention).

3

Secure genomics sharing for research

Context

Consortium of 6 European hospitals sharing WGS/WES datasets (3-10 GB per patient) for cancer studies. Pseudonymised but still re-identifiable data.

Risk

SFTP sharing with classical SSH keys. Files in cold cloud storage encrypted with AES-GCM and RSA-wrapped master key.

PosQuantum solution

PUCE Storage as collection layer (short-TTL presigned URLs). PUCE Archive per study with signed file list, allowing "patient in study" audit. Per-researcher access tokens derived via ML-KEM — each researcher has a short rotatable key.

Reference architecture

1

1. Ingestion

DICOM / HL7 FHIR modality sends via PQSL middleware (Express/FastAPI/Spring) to presigned upload endpoint.

2

2. Storage

PUCE Storage stores blobs on R2/S3 encrypted with AES-256-GCM, key wrapped by ML-KEM-1024.

3

3. Legal archive

PUCE Archive creates signed manifests by retention policy (25 years pediatric, 5 years adult), offline-verifiable.

4

4. Clinical access

PUCE Stream for in-browser DICOM viewing without full download; 1-7 day TTL tokens.

5

5. Audit

Immutable SHA3-256-signed logs + SLAAC for HIPAA/ISO 27799 inspection.

Applicable PosQuantum products

PUCE Archive
PUCE Storage
PQSL Enterprise
Migration Scanner

Regulatory compliance covered

HIPAAGDPR (saúde)NIS2ISO 27799FDA 21 CFR Part 11

Need to protect medical records for 25+ years?

Talk to our team — we design the PQC migration without halting clinical operations. PoC in 2 weeks, pilot in 60 days.