January 01, 2024
Quantum-Ready Expeditionary Communications
Isidore Quantum® Generation 2.0 Shown
Designed to be both deployable and disposable, Isidore Quantum™ (IO0001-ETH/USB/WIF) provides security for data in transit and the smallest, lightest and lowest power configuration of any competing quantum-ready device available today. Isidore Quantum™ (IO5000-ETH) is also available with the latest neuromorphic processors to provide high assurance protection of voice, video and data classified TS/SCI and below at 500 Gb/s aggregate throughput and is MIL-STD-810D ruggedized to withstand the rigors of most tactical mobile environment.
Isidore works as a pair of inline network encryptors that form a routable link layer tunnel across any black fabric. The INEs are agnostic to both the red and black networks. The red namespace is invisible to the black namespace and vice versa. The trust boundary inside each INE is easy to define and evaluate. Isidore provides hardware isolation between red and black zones. The cryptography uses 2 layers of 256-bit encryption (AES GCM) with authentication, integrity checking, anti-replay, forward secrecy. The INE pair autonomously manages the session and key with periodic rekey, key recovery and zeroization.
An Isidore pair provides confidentiality, authentication and isolation for an enterprise that must traverse an untrusted network. Isidore is more than just DIT. Isidore is not IPSEC and does not need or use PKI. Isidore is quantum-ready today.
See also Isidore Quantum's adaptive beam steering antenna for Low Probability of Detection/Low Probability of Intercept capabilities.
Designed to be both deployable and disposable, Isidore Quantum™ (IP0001-USB) provides security for data in transit and the smallest, lightest and lowest power configuration of any competing quantum-ready device available today. Isidore Quantum™ offers high assurance protection of voice, video and data and is available in MIL-STD-810D ruggedized to withstand the rigors of most tactical mobile environment.
Important Information About Isidore Quantum's Keying Methodology:
Physical and logical trust boundary with no cryptographic bypass
Commercial National Security Algorithm Suite 2.0 (CNSA2.0) compliant framework that leverages Crystals Kyber for key management, a PSK for authentication, and AES-256 (symmetric) encryption. Solution includes Galois/Counter Mode (GCM) with authentication (inner tunnel), and cipher feedback mode (outer tunnel)
Final key store is ephemeral, unique to the channel pair (loss of one is not the loss of another channel)
Key and channel management is autonomous to the pair (rekeying, key recovery, forward secrecy, anti-replay, dead peer detection)
Protocol, device and network agnostic
Isidore Quantum is Zero Trust by default
Isidore Quantum topologies available include point-to-point, hub and spoke, and mesh
Forward Edge-AI is integrating Isidore with Cubic/DTECH's M3X Compute Platform. Cubic is our Contract Manufacturing Partner.
Forward Edge-AI is also integrating Isidore Quantum with multiple Rebel Systems' TUCK Compute and Privoro's SafeCase.
Independent testing by the US Department of Defense (DOD) show Isidore Quantum™ is invisible to your network, with no forensic footprint, and no appreciable latency added, making Isidore Quantum™ ideal for bandwidth constrained networks. Because Isidore Quantum™ is protocol, network, and hardware agnostic, the product integrates seamlessly into existing business systems and is zero trust by default.
Isidore Quantum™ (IP0001-USB) Advantages
Feature | IPsec Devices | Isidore Quantum (Routable MACsec) |
Confidentiality, Integrity, Availability | Does not obscure traffic or geolocation, not quantum-resistant, no autonomous response to attacks. Not quantum-resistant as implemented | Quantum resistant, artificially intelligent (anti-fragility). Obfuscates packets |
Architecture | (IP specific) suited when dynamic security associations is required | (Protocol agnostic) designed for moderate topologies with static security associations |
Keying Methodology | PKI/KMI, certificate authority required | PKI/KMI and certificate authorities not required. Ephemeral keying algorithms |
Operational Security | Easy to detect and geolocate devices | No forensic footprint |
Power/Throughput | 30 Watts/1GB/s | 3 - 9 Watts/480Mb/s - 10Gb/s, 25 grams in weight |
Form Factor | Briefcase | Sleeve |
Ease of use | Controlled item (crisis if lost), requires skill to integrate, operate and maintain | Non-CCI, set and forget, as easy as an ATM machine to use, no integration |
Price Range | $25k- $75k | $500 - $1.6k (Does Not Include Cubic M3X, Privoro SafeCase or Rebel TUCK Compute) |
Isidore is quantum-ready today and is available for pre-order via Forward Edge-AI’s eCommerce store, and multiple Small Business Innovation Research (SBIR) sole source procurement vehicles and channels for unclassified use cases.
Isidore Quantum™ SBIR/STTRs awarded across all domains:
US Air Force - Expeditionary Communications/Contested Domains (#FA864923P0345)
US Air Force - Operational Technologies/Military IoT (#FA864923P0006)
US Navy - Advanced Computing and Software; Integrated Sensing and Cyber; Trusted AI and Autonomy (#N6833524C0170)
US Space Force – Space Communications Security (#FA864923P1259)
SBIR DATA RIGHTS:
Contract Numbers: FA864923P1259, FA864923P0345, FA864923P0006, and N6833524C0170
Contractor Name: Forward Edge-AI, Inc.
Contractor Address: 10108 Carter Canyon, San Antonio, TX 78255
Expiration of SBIR Data: 13 September 2043
Protection Period: 20 years from award of contract on 13 September 2023
The Government's rights to use, modify, reproduce, release, perform, display, or disclose technical data or computer software marked with this legend are restricted during the period shown as provided in paragraph (b)(5) of the Rights In Other Than Commercial Technical Data and Computer Software–Small Business Innovation Research (SBIR) Program clause contained in the above identified contract. After the expiration date shown above, the Government has perpetual government purpose rights as provided in paragraph (b)(5) of that clause. Any reproduction of technical data, computer software, or portions thereof marked with this legend must also reproduce the markings.
© 2024 Forward Edge-AI, Inc. All rights reserved.