
SKA-Platform™
Easy to deploy and integrate
Operating through lightweight software agents deployed on individual endpoints, SKA-Platform manages a process for the dynamic creation of encryption keys, based upon predefined security and network policies.
Arqit SDKs can be integrated simply by application developers and system integrators to create customised applications that require active authentication based on zero trust principles and quantum-safe data encryption at the application layer.
Highest security level
SKA-Platform implements the highest level of quantum-safe security to establish a root of trust on each connected endpoint and facilitates the brokering of shared symmetric keys between devices.
Supports Zero Trust principles
SKA-Platform generates encryption keys that are not only computationally secure but can also be designed for one-time use on-demand. This feature aligns seamlessly with a mature zero-trust architecture and defence-in-depth paradigm, ensuring robust network security to protect against the cyber attacks of today and the quantum threat of tomorrow
.jpg?width=7898&height=5391&name=Arqit_New_Brand_General%20(29).jpg)
Highly scalable
A standout feature of SKA-Platform is its capacity to generate an unlimited volume of keys, adaptable to variable group sizes. This dynamic capability enables the platform to effectively manage the entry and exit of devices within a group, allowing for a flexible and scalable approach to key management. SKA-Platform ensures that the security infrastructure remains robust, regardless of the scale and complexity of the networked environment.
Arqit’s platform for quantum-safe networking
Protect critical communication channels with hardened symmetric keys
Defence-in-Depth Security
During registration each device is provisioned with a ‘bootstrap’ key, delivered manually or Over-the-Air (OTA), both of which methods are quantum-safe. OTA utilises multiple Post-Quantum Algorithms (PQAs) including the NIST standardised ML-KEM algorithm to ‘wrap’ the bootstrap key and deliver it securely over the network to each device. This key is used for mutual symmetric-based authentication with SKA-Platform and is rotated for every new session to achieve perfect forward secrecy. The same authentication key is used to establish a quantum-safe channel to protect all communications between each device and SKA-Platform.
Arqit’s key agreement protocol brokers shared symmetric keys between devices using cryptography compliant with industry standards. The solution optionally incorporates the NIST ML-KEM key exchange algorithm between devices (Alice and Bob) to derive the final symmetric data encryption key.
The registration and key agreement workflows provide defence-in-depth security, leveraging multiple post-quantum algorithms in combination with symmetric cryptography to address different data protection use cases with varying levels of risk tolerance. SKA-Platform supports crypto agility, making it easy to update and switch cryptographic algorithms as PQC standards evolve and new algorithms emerge.
Protect your network today
Arqit’s platform for quantum-safe networking
Create quantum-safe keys at endpoints
- Arqit allows authenticated endpoints to create quantum-safe keys whenever needed
- Our approach aligns with government recommendations on symmetric protections
.jpg?width=7952&height=5304&name=Arqit_New_Brand_General%20(59).jpg)
.jpg?width=6000&height=4000&name=Arqit_New_Brand_General%20(60).jpg)
A scalable and flexible platform
- Reach any endpoint within your network
- Out-of-the-box integrations with major OEM vendors
- Add and remove endpoints as required over time
Rooted in secure standards
- Consumable through standard interfaces
- Cryptography adheres to relevant standards, including FIPS
- Underlying primitives can be replaced for crypto-agility
.jpg?width=5659&height=3773&name=Arqit_New_Brand_General%20(35).jpg)
Arqit’s platform for strong, mutual authentication