Space EA's new post-quantum encryption network defeats quantum's destructive effect against security, while enabling satellite architectures and communication networks the ability to harness quantum's power for DoD and commercial clients in the space sector.
The advent of quantum computing renders all current security obsolete, causing a perfect storm with the convergence of more and more connected devices, satellites, assets, and operations to and between communications networks worldwide.
As terrestrial based services become more reliant and interlinked with space-based networks and constellations in orbit, they must be secured from cyberattack. Acting on the expectancy that current encryption methods will be useless within the next decade, governments, commercial entities, and security experts are spending hundreds of millions of dollars to study and address quantum resistant security.
The Canadian Space Agency has begun a design and implementation phase for its Quantum Encryption Science Satellite (QEYSSat). Likewise, Europe is developing a broader European Quantum Communication Infrastructure (EuroQCI) initiative to establish a federation of national networks in the region.
"Satellite-enabled post quantum cybersecurity is the core element of secure communications infrastructures among constellations and other military assets," explains Rico Jones, Founder Space Engineering and Acquisition Systems, Inc. "Space EA has recently facilitated an intrusion-proof data exchange mechanism to overcome quantum computing threats.
"We can now secure communications links of any networked device against hacking, including attacks from quantum computers. The multi-patented Technology Suite delivers a post quantum cryptographic algorithm that defeats attack by Cryptanalysis, Statistical Analysis, Mathematical Analysis, AI, and Quantum Computing. This solution has undergone successful government, academic, and military testing, proven deployment, and is commercially available, now."
Other current initiatives that study the quantum problem are extremely costly and are taking longer than expected to develop. Many current hypotheses present schemes that use quantum computers to distribute keys from orbit to networks and endpoints on earth. This approach uses numerous transmissions for each key instance, which is not only complicated, but also creates new attack vectors. To date, these objectives are not met.
Space EA quickly accelerated ahead of these approaches to circumvent key distribution problems by utilizing a post-quantum secure key system that requires no key distribution at all.
Jones further details the secure and efficient process, "Keys are created, used, and destroyed at the time-point of encryption and then, on demand, recreated, used, and destroyed at the time-point of decryption. There is no key transfer and no key storage, as well as no distance limits, which the competing hypotheses are struggling to overcome."
The space community is highly future-looking, indicating why government and commercial organizations have trusted Space EA team members for over a third of a century for their acute knowledge of and exceptional advisory on the most advanced technologies available for pivotal missions and initiatives.
"In short, we have to be the best at knowing the industry's best," advocates Jones.
Space EA's timely focus on facilitating technologies for National Security strength and advanced satellite innovation is in step with and crucially significant to the aggressive space implementations of its customers.
This immediate necessity for security and innovation is evidenced by the US Space Force investing billions of dollars in new space technologies along with the Space Development Agency (SDA) and Missile Defense Agency (MDA) developing new low earth orbit (LEO) sensor satellites to detect and track maneuvering hypersonic glide vehicles and other advanced weapons.
"As quantum emergence drives a global shift to new satellite-enabled post-quantum cybersecurity, Space EA's forward-reaching design engineering and unprecedented technology offerings ensure that our clients are well-positioned to implement essential innovation and well-equipped to navigate future unknowns," reports Jones.
Space EA's Technology Suite includes a patented Network Access Control, which deploys a secure untraceable private network that masks clients on the Internet (4Q21 release). The solution's "1-second non-repeating process-change" technique denies capture of data. It does not respond to port probes, ignores DDoS attack, fake IP attempts, and unauthenticated and unapproved network messages. The NAC has successfully prevailed against extensive government and commercial testing and has never succumbed to an attack against it.
Related Links
Space EA Systems
Cyberwar - Internet Security News - Systems and Policy Issues
| Tweet |
Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain. With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords. Our news coverage takes time and effort to publish 365 days a year. If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution. | ||
SpaceDaily Contributor
$5 Billed Once credit card or paypal | SpaceDaily Monthly Supporter
$5 Billed Monthly paypal only |
Apple defends child protection features over privacy concerns
San Francisco (AFP) Aug 14, 2021
Apple on Friday defended new child protection features that would check images uploaded to its cloud storage and on its messaging platform, rejecting concerns the updates pose threats to privacy. "We can see that it's been widely misunderstood," the US tech giant's software chief Craig Federighi said of the update rollout in an interview with the Wall Street Journal published Friday. Last week, Apple unveiled two features to debut on iPads and iPhones in the United States. One can identify c ... read more