
The US federal agency leading the global competition to select and standardize post-quantum cryptographic algorithms.
Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.
Switzerland · Company
A global leader in quantum cybersecurity solutions, specifically known for their Quantis QRNG chips and appliances.
A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.
Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.
A major researcher and developer of QKD technology, holding numerous patents and deploying commercial QKD networks.
Integrated quantum computing company formed by Honeywell and CQC.
Australian quantum cybersecurity company offering high-throughput QRNG appliances.
Develops chip-based QKD hardware to miniaturize quantum security for telecommunications.
Provides QuantumCloud, a platform that uses a symmetric key agreement protocol originally designed for satellite delivery.
South Korea's largest wireless telecommunications operator.
Quantum-secure communications represent a fundamental shift in how defense and intelligence agencies protect sensitive information from emerging computational threats. As quantum computers advance toward practical implementation, they pose an existential risk to current encryption standards—particularly RSA and elliptic curve cryptography—which underpin most military and government communications today. This technology addresses this vulnerability through two complementary approaches: post-quantum cryptography (PQC) algorithms that resist attacks from both classical and quantum computers, and quantum key distribution (QKD) systems that leverage the laws of quantum mechanics to detect eavesdropping attempts. PQC relies on mathematical problems believed to be intractable even for quantum computers, such as lattice-based or hash-based cryptographic schemes, while QKD uses quantum states of photons to generate and distribute encryption keys with provable security guarantees.
The defense sector faces a critical "harvest now, decrypt later" threat, where adversaries collect encrypted communications today with the intention of decrypting them once sufficiently powerful quantum computers become available. This poses severe risks for classified military operations, intelligence sharing among allied nations, and long-term strategic planning documents that must remain confidential for decades. Quantum-secure communications directly counter this threat by rendering intercepted data useless to future attackers. For military applications, these systems enable secure command and control links, protect satellite communications from sophisticated adversaries, and safeguard intelligence data exchanges. The technology also addresses the challenge of securing communications in contested electromagnetic environments where traditional encryption key management becomes vulnerable to disruption or compromise.
Several defense organizations and government agencies have begun transitioning to quantum-resistant protocols, with the U.S. National Institute of Standards and Technology having standardized initial PQC algorithms for widespread adoption. Early QKD deployments have appeared in secure government networks and critical infrastructure protection scenarios, though practical limitations around transmission distance and infrastructure requirements currently constrain broader battlefield implementation. Research efforts focus on developing hybrid systems that combine classical encryption with quantum-resistant methods, allowing for gradual migration while maintaining backward compatibility. As quantum computing capabilities accelerate and geopolitical tensions increase the value of signals intelligence, quantum-secure communications will become essential infrastructure for maintaining information superiority. The technology represents not merely an incremental security improvement but a necessary evolution to preserve the confidentiality of defense communications in an era where the fundamental assumptions underlying current cryptography are approaching obsolescence.