Skip to main content

Phase I/II STTR - Space Communications Security

Quantum-resistant cyber security for C6ISR of CubeSats and On-Orbit Robots (Orbots), Space COMSEC product

E
Written by Eric Adolphe
Updated over 2 weeks ago

January 01, 2024

Recommended:

Isidore Quantum Space COMSEC

Much of the world’s critical infrastructure – such as communications, air transport, maritime trade, financial and other business services, weather and environmental monitoring intelligence, and defense systems – depend on the space infrastructure, including satellites, ground stations and data links at national, regional, and international levels. See Quantum Risk White Paper here.

The economic and data security risks associated with the greatly expanded aperture of vulnerability created by the dramatically increased dependency on cyber-based space infrastructure pose serious risks for ground-based critical infrastructure. Cyberattacks can include targeting mission packages, and attacks on the ground infrastructure.

Attacking the baseband radio interface that CubeSats rely upon has been well documented for some time. Any wireless infrastructure on an orbital platform is a large attack surface and because of its size, presents a perennial source of zero-day bugs that can lead to a malicious actor gaining complete control of a CubeSat without requiring physical access.


Why it matters

Space isn’t just orbit—it’s critical infrastructure. Satellites, ground stations and data links underpin communications, transport, weather, intelligence and national defense.
Yet, orbital platforms are vulnerable. Wireless links on tiny spacecraft create large “attack surfaces,” and existing cryptographic systems are too heavy for CubeSat-scale use.


Meanwhile: Space COMSEC devices are ageing, and many certifications expire soon—creating a pressing national security gap.


What we did

Project: Phase I/II STTR – Space Communications Security

  • Developed Isidore Quantum®—a quantum-resistant encryption system purpose-built for space and tactical environments.

  • Designed for low-size, weight & power (SWaP) radiation hardened and ruggedized for Low Earth Orbit (LEO).

  • Works independently of protocols, networks or PKI: two inline encryptor units tunnel across “black” fabrics with hardware isolation of red and black zones.

  • Integrates AI-based self-healing/auto-immune anomaly detection to respond to cyber-threats.

  • Targets use on CubeSats, on-orbit robots (Orbots) and in contested space communications (Space COMSEC).


The result

A communications security solution built for space:

  • Quantum-ready encryption (CNSA 2.0, ML-KEM, AES-256, forward secrecy) for data in transit.

  • Robust to contested, denied, or degraded operational environments (CDO-L).

  • Enables CubeSats and small platforms to secure links without the burden of legacy COMSEC.


Why you should care

  • The space domain is rapidly evolving and increasingly contested—resilient, secure communications are no longer optional.

  • Legacy systems are reaching end-of-life: this gives buyers a path to modernise with quantum-resilient tech.

  • The project is SBIR/STTR-funded and structured for «Phase III sole-source» contracting—so procurement-friendly.


Stakeholders

Award a Phase III Sole Source Contract

How to engage

  1. Define your requirements: start with a SOW/SOO/PWS (or use their automated tool).

  2. Conduct market research: use the material here and request a Rough Order of Magnitude (ROM) from Forward Edge-AI.

  3. Explore contracting under SBIR/STTR Phase III sole-source pathways.

  4. Leverage recommended language for Justification & Approval (J&A) when citing quantum-resilience, Zero Trust, SATCOM, space COMSEC.

Space Products Include:

  • Quantum-Resistant Encryptor for Space COMSEC

  • Machine Learning (M/L) Algorithms to Detect and Respond to Cyber-intrusions

A Federal Agency may enter into a Phase III SBIR/STTR agreement at any time with a Phase I OR II Awardee. A subcontract to a Federally funded prime contract may be a Phase III award.

  1. Step 1 Requirements Document: Prepare a Statement of Work (SOW), Statement of Objectives (SOO), or Performance Work Statement (PWS), or use our automated tool to generate a document

  2. Step 2 Market Research: Use this page as your market research, or view a list of other eligible projects, then request a Rough Order Magnitude (ROM) from Forward Edge-AI

  3. Step 3 Funding: Performed by the government

  4. Step 4 Sole Source Justification: A Memorandum for the Record is required in lieu of a J&A or SSJ

  5. Step 5 Provide Requirements Package to Contracting Officer: Performed by the government

  6. Step 6 Solicitation: Performed by the government

  7. Step 7 Pre-Negotiation Memorandum: Use GSA CALC as a benchmark to determine fair and reasonableness of our ROM

  8. Step 8: Contract Award: Performed by the government

Language for Step 4 (Determination and Finding):

  • Artificial Intelligence (Anomaly Detector, Deep Reinforcement Learning Agent), Counter Adversarial AI, Encryption, cybersecurity, neuromorphic processor, physics-based models, quantum resistant, Radio Frequency, SATCOM, Zero Trust

  • Autonomy, Command, Control, Communications (C3), CubeSat, Space COMSEC, Contested, Denied Operationally Limited (CDO-L), Telecommunications

List of Phase III contracts awarded so far

  • Come back soon

SBIR DATA RIGHTS:

Awarding Agency: US Air Force

Contract Numbers: FA864923P0397, FA864923P1259

Contractor Name: Forward Edge-AI, Inc.

Contractor Address: 10108 Carter Canyon, San Antonio, TX 78255

Expiration of SBIR Data: 13 September 2043

Protection Period: 20 years from award of contract on 13 September 2023

The Government's rights to use, modify, reproduce, release, perform, display, or disclose technical data or computer software marked with this legend are restricted during the period shown as provided in paragraph (b)(5) of the Rights In Other Than Commercial Technical Data and Computer Software–Small Business Innovation Research (SBIR) Program clause contained in the above identified contract. After the expiration date shown above, the Government has perpetual government purpose rights as provided in paragraph (b)(5) of that clause. Any reproduction of technical data, computer software, or portions thereof marked with this legend must also reproduce the markings.

© 2024 Forward Edge-AI, Inc. All rights reserved.

Did this answer your question?