
Defence
.jpg?width=1772&height=1000&name=Arqit_New_Brand_Defence%20(10).jpg)
With the exponential increase in small form factor devices and the development of the Military Internet of Things (UxVs, sensors, etc) the manual provision of symmetric keys that require dedicated hardware for implementation is increasingly becoming unsupportable.
Our software removes the SWaP limitations of hardware encryption.
Group keys, a stalwart of military communications, provide critical capability but compromise of one key creates significant operational risk. Continued use of group keys requires a new approach.
Arqit’s unique solution solves all of these problems and more, bringing scalable, dynamically controllable symmetric keys into the digital age.
Arqit’s software is deployed as part of quantum-safe and ZTNA strategies by leading operators of critical private networks
SKA-Platform serves as a central pillar in architecting modern data and communication networks, enabling the full potential of digital technologies within operations while outperforming existing cybersecurity solutions. By combining the security strengths of PSKs with the flexibility of PKI, Arqit’s solution addresses the evolving challenges and requirements of the digital battle space, ensuring mission success and operational superiority over adversaries.
.jpg?width=3500&height=2100&name=Arqit_New_Brand_Defence%20(02).jpg)
Read the UAS Solution Brief
Software solution to secure data and assets in multi-domain platforms from edge to core
Proven and demonstrated in ops environment, integrated at general availability with leading technology partners and OEMs across multiple sectors and use cases.
Accreditable solution that meets NCSC recommendations, CSfC Symmetric Key Management Requirements Annex, aligns with NSA guidance and is validated by leading cyber security institutions.
Benefits:
- Delivers autonomous system security: UxVs, IoT
- Reduces operational overhead – replaces physical delivery of symmetric key hardware
- Removes the cost, restrictions and SWaP limitations associated with use of hardware encryption devices
- Utilises a split-trust, zero-trust model with strong authentication that enables secure data across any bearer
- Dynamic control of endpoints removes risk associated with loss of assets and keys stored on the devices
- Purge rogue users already in a network - symmetric keys refresh as frequently as every 30 seconds
- Capability can be deployed in the core, at the edge or a hybrid, enabling complex operational models
- Provide interoperability between allied forces without requirement to pre-share key data or align equipment procurement
- No need for rip and replace, works with existing systems and can be integrated into hybrid models
- Zero impact on bandwidth
- Uses well-established cryptographic standards to secure data in transit across communication and data networks, and heterogeneous comms bearers
.png?width=2048&height=2048&name=Arqit_New_Brand_Defence%20(18).png)
Eliminate security risk
Current operations require either cryptographic hardware installed on UxV with manual key provision or pre-installed by the OEM leading to long key lifetimes and expensive rekeying processes.
SKA-Platform enables UxVs of any size (eliminating SWaP restrictions) to create symmetric keys dynamically as required with cryptographic hardware required.
Arqit enables swarming and group keys
A wider picture of operations with Arqit SKA-Platform. Security group controls enable segregation of responsibility. Rotating group keys for broadcast are facilitated via individual symmetric channels.
.jpeg?width=5824&height=3264&name=Arqit_New_Brand_Defence%20(11).jpeg)
As demand grows for better, safer, faster delivery and provisioning, a secure by design zero trust approach and minimal SWaP impact, Arqit is uniquely positioned to enable secure digital operational concepts in the defence sector. As an intrinsic element of your security, we ensure encrypted mission-critical communications across the digital battlefield which meet your real-world demands.