Skip to main content
All CollectionsForward Edge-AI ProductsIsidore QuantumIsidore Quantum Brochures
Isidore Quantum - Expeditionary Communications Brochure
Isidore Quantum - Expeditionary Communications Brochure

Quantum-Ready Executive Communications in contested environments

E
Written by Eric Adolphe
Updated over a week ago

January 01, 2024

Quantum-Ready Expeditionary Communications

Isidore Quantum® Generation 2.0 Shown

Designed to be both deployable and disposable, Isidore Quantum™ (IO0001-ETH/USB/WIF) provides security for data in transit and the smallest, lightest and lowest power configuration of any competing quantum-ready device available today. Isidore Quantum™ (IO5000-ETH) is also available with the latest neuromorphic processors to provide high assurance protection of voice, video and data classified TS/SCI and below at 500 Gb/s aggregate throughput and is MIL-STD-810D ruggedized to withstand the rigors of most tactical mobile environment.

Isidore works as a pair of inline network encryptors that form a routable link layer tunnel across any black fabric. The INEs are agnostic to both the red and black networks. The red namespace is invisible to the black namespace and vice versa. The trust boundary inside each INE is easy to define and evaluate. Isidore provides hardware isolation between red and black zones. The cryptography uses 2 layers of 256-bit encryption (AES GCM) with authentication, integrity checking, anti-replay, forward secrecy. The INE pair autonomously manages the session and key with periodic rekey, key recovery and zeroization.

An Isidore pair provides confidentiality, authentication and isolation for an enterprise that must traverse an untrusted network. Isidore is more than just DIT. Isidore is not IPSEC and does not need or use PKI. Isidore is quantum-ready today.

See also Isidore Quantum's adaptive beam steering antenna for Low Probability of Detection/Low Probability of Intercept capabilities.

Designed to be both deployable and disposable, Isidore Quantum™ (IP0001-USB) provides security for data in transit and the smallest, lightest and lowest power configuration of any competing quantum-ready device available today. Isidore Quantum™ offers high assurance protection of voice, video and data and is available in MIL-STD-810D ruggedized to withstand the rigors of most tactical mobile environment.

Important Information About Isidore Quantum's Keying Methodology:

  • Physical and logical trust boundary with no cryptographic bypass

  • Commercial National Security Algorithm Suite 2.0 (CNSA2.0) compliant framework that leverages Crystals Kyber for key management, a PSK for authentication, and AES-256 (symmetric) encryption. Solution includes Galois/Counter Mode (GCM) with authentication (inner tunnel), and cipher feedback mode (outer tunnel)

  • Final key store is ephemeral, unique to the channel pair (loss of one is not the loss of another channel)

  • Key and channel management is autonomous to the pair (rekeying, key recovery, forward secrecy, anti-replay, dead peer detection)

  • Protocol, device and network agnostic

  • Isidore Quantum is Zero Trust by default

Isidore Quantum topologies available include point-to-point, hub and spoke, and mesh

Forward Edge-AI is integrating Isidore with Cubic/DTECH's M3X Compute Platform. Cubic is our Contract Manufacturing Partner.

Forward Edge-AI is also integrating Isidore Quantum with multiple Rebel Systems' TUCK Compute and Privoro's SafeCase.

Independent testing by the US Department of Defense (DOD) show Isidore Quantum™ is invisible to your network, with no forensic footprint, and no appreciable latency added, making Isidore Quantum™ ideal for bandwidth constrained networks. Because Isidore Quantum™ is protocol, network, and hardware agnostic, the product integrates seamlessly into existing business systems and is zero trust by default.

Isidore Quantum™ (IP0001-USB) Advantages

Feature

IPsec Devices

Isidore Quantum (Routable MACsec)

Confidentiality, Integrity, Availability

Does not obscure traffic or geolocation, not quantum-resistant, no autonomous response to attacks. Not quantum-resistant as implemented

Quantum resistant, artificially intelligent (anti-fragility). Obfuscates packets

Architecture

(IP specific) suited when dynamic security associations is required

(Protocol agnostic) designed for moderate topologies with static security associations

Keying Methodology

PKI/KMI, certificate authority required

PKI/KMI and certificate authorities not required. Ephemeral keying algorithms

Operational Security

Easy to detect and geolocate devices

No forensic footprint

Power/Throughput

30 Watts/1GB/s

3 - 9 Watts/480Mb/s - 10Gb/s, 25 grams in weight

Form Factor

Briefcase

Sleeve

Ease of use

Controlled item (crisis if lost), requires skill to integrate, operate and maintain

Non-CCI, set and forget, as easy as an ATM machine to use, no integration

Price Range

$25k- $75k

$500 - $1.6k (Does Not Include Cubic M3X, Privoro SafeCase or Rebel TUCK Compute)

Isidore is quantum-ready today and is available for pre-order via Forward Edge-AI’s eCommerce store, and multiple Small Business Innovation Research (SBIR) sole source procurement vehicles and channels for unclassified use cases.

Isidore Quantum™ SBIR/STTRs awarded across all domains:

  • US Air Force - Expeditionary Communications/Contested Domains (#FA864923P0345)

  • US Air Force - Operational Technologies/Military IoT (#FA864923P0006)

  • US Navy - Advanced Computing and Software; Integrated Sensing and Cyber; Trusted AI and Autonomy (#N6833524C0170)

  • US Space Force – Space Communications Security (#FA864923P1259)

SBIR DATA RIGHTS:

Contract Numbers: FA864923P1259, FA864923P0345, FA864923P0006, and N6833524C0170

Contractor Name: Forward Edge-AI, Inc.

Contractor Address: 10108 Carter Canyon, San Antonio, TX 78255

Expiration of SBIR Data: 13 September 2043

Protection Period: 20 years from award of contract on 13 September 2023

The Government's rights to use, modify, reproduce, release, perform, display, or disclose technical data or computer software marked with this legend are restricted during the period shown as provided in paragraph (b)(5) of the Rights In Other Than Commercial Technical Data and Computer Software–Small Business Innovation Research (SBIR) Program clause contained in the above identified contract. After the expiration date shown above, the Government has perpetual government purpose rights as provided in paragraph (b)(5) of that clause. Any reproduction of technical data, computer software, or portions thereof marked with this legend must also reproduce the markings.

© 2024 Forward Edge-AI, Inc. All rights reserved.

Did this answer your question?