Project cooperationUpdated on 11 April 2025
Quantum-Ready Security 4 Next Generation Organisations
About
This architecture will be deployed through a protocol that mandates continuous authentication and authorization of both data source nodes and end users, employing post-quantum cryptographic algorithms. In the test run, we will integrate this advanced security system with a next-generation intelligence and operation management system. To achieve this, we assess the relevant components of the ZTA and create a streamlined system. Our approach for both the architectural design and its implementation will prioritize performance, particularly for handling high-speed streaming data. Further, we will consider account power consumption, thus supporting real-time risk-critical and mission-critical tasks across a range of hardware platforms. To demonstrates how our system concept can be translated into tangible improvements in defence capabilities, particularly enhance next-generation HQs and defence forces in data, intelligence and operational excellency, we propose the integration of the newly developed sophisticated security system with a next-generation data, intelligence, and operation management system, in line with National Institute of Standards and Technology (NIST) approved quantum-safe crypto algorithms and a Zero Trust Lightweight protocol. Both data-in-transit and stored data & intelligence will be protected from undue access by unauthorized attempts via a unique end-to-end post-quantum security integration. We will refine this protocol considering the performances of the system against various data types and speeds such as text, radar, image, high-definition video streaming data, etc. via a revision of the required components on the NIST ZT security architecture framework necessary for our purposes.
Against this backdrop, our solution is related to the following emerging and disruptive technologies: artificial intelligence, post-quantum, and next-generation secure communication networks. Accordingly, project objectives are as follows: 1) Developing Quantum-Resistant Security Approach 2) Developing a Zero-Trust Architecture. 3) Ensuring Lightweight Design 4) Safeguarding Crypto Agility 5) Developing Public Key Infrastructure (PKI) 6) Providing Multi-Factor Authentication (MFA) 7) Applying Data Access Policy 8) Applying Encryption 9) Ensuring integrity
Stage
- Execution - Development stage (preparation)
Type
- Research and Innovation Action
- Innovation Action
Similar opportunities
Product
- Security
- Cryptography
- Border control
- Commercial partners
- Technological partners
- Cyber-Physical Systems
- Investment opportunities
- Artificial Intelligence (AI)
- Crisis response and recovery
- Security against emergencies
- Digital Twin/Predictive Maintenance
- Big Data, Data Analytics, and Data Mining
Hasan SUZEN
CEO at Hybrid Core
Zavantem, none, Belgium
Partnership
Collaborations on Training Infrastructures for Secure Sectors
- Advisory
- Innovation
- Research and development
Ilario Truppa
CTO at OC Open Consulting SB srl
Trento, Italy
Product
Scalable and Secure LMS Architecture Based on Kubernetes
- ICT
- Other
- Security
- Simulation
- Cybersecurity
- Border control
- Cloud Computing
- Commercial partners
- Technological partners
- Augmented/Mixed Reality
- Resilient infrastructure
- Artificial Intelligence (AI)
- Crisis response and recovery
Ilario Truppa
CTO at OC Open Consulting SB srl
Trento, Italy