Project cooperationUpdated on 11 April 2025
Quantum-Ready Security 4 Next Generation Organisations
About
This architecture will be deployed through a protocol that mandates continuous authentication and authorization of both data source nodes and end users, employing post-quantum cryptographic algorithms. In the test run, we will integrate this advanced security system with a next-generation intelligence and operation management system. To achieve this, we assess the relevant components of the ZTA and create a streamlined system. Our approach for both the architectural design and its implementation will prioritize performance, particularly for handling high-speed streaming data. Further, we will consider account power consumption, thus supporting real-time risk-critical and mission-critical tasks across a range of hardware platforms. To demonstrates how our system concept can be translated into tangible improvements in defence capabilities, particularly enhance next-generation HQs and defence forces in data, intelligence and operational excellency, we propose the integration of the newly developed sophisticated security system with a next-generation data, intelligence, and operation management system, in line with National Institute of Standards and Technology (NIST) approved quantum-safe crypto algorithms and a Zero Trust Lightweight protocol. Both data-in-transit and stored data & intelligence will be protected from undue access by unauthorized attempts via a unique end-to-end post-quantum security integration. We will refine this protocol considering the performances of the system against various data types and speeds such as text, radar, image, high-definition video streaming data, etc. via a revision of the required components on the NIST ZT security architecture framework necessary for our purposes.
Against this backdrop, our solution is related to the following emerging and disruptive technologies: artificial intelligence, post-quantum, and next-generation secure communication networks. Accordingly, project objectives are as follows: 1) Developing Quantum-Resistant Security Approach 2) Developing a Zero-Trust Architecture. 3) Ensuring Lightweight Design 4) Safeguarding Crypto Agility 5) Developing Public Key Infrastructure (PKI) 6) Providing Multi-Factor Authentication (MFA) 7) Applying Data Access Policy 8) Applying Encryption 9) Ensuring integrity
Stage
- Execution - Development stage (preparation)
Type
- Research and Innovation Action
- Innovation Action
Similar opportunities
Product
- Security
- Cryptography
- Border control
- Commercial partners
- Technological partners
- Cyber-Physical Systems
- Investment opportunities
- Artificial Intelligence (AI)
- Crisis response and recovery
- Security against emergencies
- Digital Twin/Predictive Maintenance
- Big Data, Data Analytics, and Data Mining
Hasan SUZEN
CEO at Hybrid Core
Zavantem, none, Belgium
Project cooperation
Protocol for secure communications D2OTP
- Innovation Action
- Coordination and Support Action
- HORIZON-CL3-2025-CS - CYBERSECURITY
- Execution - Development stage (preparation)
- HORIZON-CL3-2025-FCT - FIGHTING CRIME AND TERRORISM
- HORIZON-CL3-2025-02-CS-ECCC-03: Privacy Enhancing Technologies
- OTHER: National funding for dual-use projects (CDTI INNOVACIÓN)
- HORIZON-CL3-2025-01-SSRI-06: Demand-led innovation for civil security through Pre-Commercial Procurement (PCP)
JJ Vega
Co-founder of D2OTP at D2OTP
Madrid, Spain
Product
Protocol for secure communications D2OTP
- ICT
- C4ISR
- Drones
- Security
- IoT and IIoT
- Cryptography
- Cybersecurity
- Underwater systems
- Commercial partners
- Technological partners
- Cyber-Physical Systems
- Investment opportunities
- Resilient infrastructure
- Aerial systems and equipments
- Land vehicles, systems and equipments
JJ Vega
Co-founder of D2OTP at D2OTP
Madrid, Spain