Skip to content
1574331660_Arqit_Images_Hero_1920x_0000s_0025_AdobeStock_1066367914

SKA Edge Controller (SKA-EC)

SKA-EC is a rapidly deployable, lightweight platform that enables strong, scalable, high assurance security at the edge and in air gapped environments.

Lightweight endpoint devices can now benefit from symmetric encryption without the complexities, cost implications and limitations of traditional pre-shared keys, as well as avoiding the risks associated with use of PKI, future proofing the network against quantum attack.

Enabling operational advantage through cybersecurity

Robust-1
Robust encryption running on COTS technology

Integrates into existing security without the need to rip and replace

Flexible
Flexible key creation and security grouping control

Enables dynamic control of networks to add and remove users and endpoints as required

Ephemeral
Enables ephemeral, rotating keys on endpoint devices

Removes need to pre-load and rekey an entire device fleet

portable hardware
Can be deployed in minutes on portable hardware

Rapidly scalable across diverse and complex networks without delay

SKA-EC ruggedised appliances support rapid deployment of operational deployments made up of single or distributed C2 nodes to provide agility, high assurance security, enhanced manoeuvrability, reduction in SWaP, hardware costs and overheads to enhance modern military operations.

Use Cases

Dispersed and Distributed Headquarters

SKA-EC enables symmetric encryption for a modern deployed headquarters made up of multiple scalable nodes that can operate independently or collectively, creating a dispersed and disaggregated environment.

  • Assurable solution
  • Bearer agnostic
  • Dynamic generation and forward rotation of symmetric keys
  • Eliminate hardware costs, security implications and support requirements
  • Manage user groups and information sharing at the encryption layer
SKA-EC deployed HQ

 

UxV SKA-EC diagram

 

Next-Gen UxV Operations

SKA-EC enables UxVs of any size to create dynamic symmetric keys without cryptographic hardware, enabling secure communication between Ground Control Station (GCS), UxVs and SKA-EC (core network).

  • Eliminates SWaP restrictions
  • Continuous endpoint authentication supports anti-spoofing and dynamic access control

Secure your Network

Solution

SKA-EC provides a simple installation and setup process on hardware, core networks or cloud environments, allowing distributed C2 node deployments in hostile terrains e.g. Forward C2 nodes closer to operations or mobile C2 nodes that can rapidly relocate as the battlefield evolves.

SKA-EC can also be easily deployed in cloud VPCs on cloud virtual machines to support ephemeral cloud missions where C2 nodes can be spun up rapidly to support covert communications in dynamic environments e.g. VPN communications between Unmanned Submarine Vehicles (USVs) and operational headquarters.

SKA-EC eliminates current restrictions on deployed C2 infrastructure. By overcoming the complexities, cost implications and limitation of Pre-shared Keys (PSKs), and avoiding the risks associated with use of PKI, SKA-EC provides a cost effective, crypto-agile and secure-by-design solution that can integrate seamlessly into existing hardware and software solutions. SKA-EC enables split trust and zero trust architectures whilst providing dynamic generation of symmetric keys across trusted endpoints.

 

Operations

  • Extends security to the edge, providing flexibility and agility.
  • Bearer Agnostic – removes operational limitations associated with reliance on physical network connections, enabling utilisation of wireless technologies and commercial networks.
  • Enables dispersed and distributed operations to support current future deployment models.
  • Real-time management of endpoints and ad-hoc creation and reforming of device groupings, allowing flexible network access control

1574331660_Arqit_Images_2column_58_0035_AdobeStock_579145135

Arqit_General_580x300 45

Economics

  • Provide security at the edge without expensive hardware-based encryption, support costs and associated SWaP restrictions.
  • Reduce manual key distribution, storage and management costs.
  • Compatible with current encryption algorithms and industry standards, reducing integration overheads.

Security

  • Dynamic generation and forward rotation of symmetric session and authentication keys, providing forward secrecy and eliminating manual key management errors.
  • Anti-spoofing capability supported by forward rotating individual device authentication keys.
  • Supports split trust/zero trust architectures to provide continuous device authentication and granular access control.
  • Cryptographically agile, adapting to any future key size without impacting speed and performance and independent of any hardware requirements.

fighter jet planes flying at sunset

Worker inspecting wind farm

Compliance

  • Conforms to NIST and CSNA 2.0 standards for cryptography e.g. AES-256, Hashing algorithms
  • Compliance with National Security Memorandum NSM-10 and NSA CSfC Symmetric Key Management Requirements Annex 2.1, FIPS 140-3 Inside.
  • Agnostic to choice of cipher and hashing algorithm which allows for replacement as new standards emerge.
  • ISO 27001, Cyber Essentials certified

SKA-EC serves as a central pillar in architecting deployed operations with distributed C2 nodes, enabling the full potential of modern military operations whilst delivering cost and operational efficiencies and improved agility and flexibility.

By combining the security strengths of dynamic PSKs with the adaptability of PKI, SKA-EC addresses the evolving challenges and requirements of deployed and desegregated operations to ensure mission success.