office-svgrepo-com 1
11
Companies using KeyPact
users-svgrepo-com 1
3960
Users acrive in KeyPact
globe-svgrepo-com (2) 1
12
Countries where KeyPact is active

KeyPact pillars

icons8-quantum-100

Store & Share

All data streams, message structures, and APIs already comply with the principles of post-quantum cryptography (PQC). Even in its current form, all user data is end-to-end encrypted and mathematically protected against both classical and future quantum attacks.

folder 1

Mail Provider

The web version uses OAuth2 authentication and supports multiple linked accounts (Gmail, Outlook, MS365) via time- and session-based tokens. Users can send PQC-secured emails, share files, and use KeyPactMail—an internal, end-to-end encrypted service that never runs over the public internet.

key 1

Outlook & Gmail plugin

Add our Outlook & Gmail plugin to your existing Outlook or Gmail account. This applies PQC end-to-end encryption to your email. Combined with our AI-powered email filter, you'll never be bothered by spam or phishing emails again. The unique combination with a file explorer keeps all your files encrypted in your email. Simplicity and security can go hand in hand!

KeyPact Compliances

image 2
image 5
image 1

Team KeyPact

icon-256x256
icon-256x256
icon-256x256

KeyPact Facts

We've spent over six years developing a PQC end-to-end encryption protocol that truly encrypts your data, Hotmail, Outlook, Live, and Gmail. We add encryption to your existing email. You create the encryption key on your device (browser), so no one can access your key or your data. Not even us at KeyPact. Therefore, we can never hand over the key or lose it through a (server) hack.

We have over 50 years of combined experience in developing complex and secure protocols. In recent years, we've been developing the KeyPact Protection Protocol. Thanks to the KPP, you can confidently store data and email anywhere in the world in the cloud. We encrypt email from all Outlook versions, including Gmail. We also have our own email client. All email is truly end-to-end encrypted. Contact us to learn how we can help you.

Every time you save something, a new key is created to encrypt the file, email, photo, or video. So everything gets its own encryption key! While others store the key on a server, at KeyPact, the encryption key stays on your computer or phone. No one has access to it, not even us at KeyPact.

 

  • What is KeyPact?
    • KeyPact delivers a quantum-resistant, zero-knowledge communication platform for secure email and file sharing. It combines ML-KEM-1024, AES-256-GCM, and bidirectional Double Ratchet, supplemented with Passkey/FIDO2/YubiKey authentication for hardware-based identity verification.

  • What makes KeyPact so safe?
    • All key exchanges use ML-KEM-1024 (NIST PQC standard). Session keys
      evolve via a bidirectional Double Ratchet mechanism, which covers both incoming and
      outgoing traffic.
      ● Forward secrecy: Used keys are immediately destroyed.
      ● Post-compromise security: Every message introduces new entropy.
      ● Irreversible: The ratchet chains are unidirectional and hash-based—old
      keys cannot be mathematically recovered.
      ● Independent chains: Send and receive chains evolve independently.
      This way, every message and file has a unique, irreconcilable key, making
      reverse decryption impossible even for quantum attackers.
       
  • Who came up with KeyPact?
    • KeyPact was conceived by a group of security and intelligence specialists. We leveraged our years of experience in this field to design KeyPact. We wanted to bring a product to market that guaranteed you freedom from monitoring by tech giants, hackers, and others. And we've achieved this. We call it KeyPact.
       
  • Can anyone view my files?
    • Only the people and companies you're connected to and share an email, file, photo, or video with can open it. No one else, not even us at KeyPact, can see or open your files. If you no longer want to share a file, you can easily revoke it, and the other person can no longer open it.
      The key never leaves the endpoint, is never stored by KeyPact, and cannot be reconstructed by third parties. For government and defense applications,
      the KeyPact.enc capsule supports an additional encryption layer on top of AES-GCM (such as
      ChaCha20-Poly1305 or hardware-based HSM ciphers). This allows institutions to enforce their own crypto policies without sacrificing interoperability.
       

How it practical works

download 1
1. Sign up

All you have to give up, are initials, name and email address. After setup you can login with your email address and your password.

user 1
2. Create an account

Create an account and set up your address book. Keypact works like LinkedIn, you have to connect before you can share/email

search 2
3. Search receiver

There is a public contact list. You can find your contact person and make a connection. This is a one-time action.

share-2 1
4. Share Files

After your contact has accepted your request, you can start sharing files and email securely with QPC email and security.