Tuesday 31 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Post-Quantum trials quantum-resilient drones built for future battlefield threats

Trial sees heavyweight post-quantum cryptography deployed on drones for the first time, with plans to move toward allied deployment

Carly PagebyCarly Page
March 31, 2026
in News
black and white round illustration
Share on Linkedin

A UK-based cybersecurity startup claims to have done what many in cryptography circles have long written off as impractical: getting one of the heaviest post-quantum algorithms airborne on a drone without compromising its flight.

You Might Also Like

A BEAM of light for EU sovereignty as Belgium rolls out Matrix-based messaging app for government

Shield AI raises $1.5 billion to acquire Aechelon, a military simulation system

Inside Ukraine’s plans to become a global military data hub

Post-Quantum and STV Group say they have successfully trialled a quantum-resilient drone platform built around the airborne use of Classic McEliece, with testing carried out at STV’s weapons facility in the Czech Republic and further field validation planned on systems already operating in active theatres. 

The trial builds on an earlier partnership between Post-Quantum and STV to embed quantum-safe communications across defence systems, including drones and command-and-control networks, aimed at NATO and allied deployments. 

At the centre of the claim is not just that post-quantum cryptography can be made to work on unmanned systems, but that one of its most unwieldy candidates can be made operational. Classic McEliece has long been regarded as a non-starter for constrained environments due to its large public key size, typically around one megabyte. That has pushed most real-world implementations towards more efficient alternatives, particularly CRYSTALS-Kyber.

“Nobody has solved that for a drone before. We have,” Post-Quantum CEO Rikky Hasan told Resilience Media. “Classic McEliece has nearly 50 years of unbroken cryptanalytic scrutiny behind it and no other post-quantum algorithm comes close to that security track record. Deploying a newer, less-studied algorithm on a military platform because it is more convenient is a risk decision. We chose not to make that compromise.”

The company’s approach has been to avoid treating the algorithm as a drop-in replacement for existing cryptography. Instead, it has engineered how and where it is used within the communications stack. 

“Rather than treating it as a generic, drop-in replacement, we engineered how and where it is used within the communications stack,” Hasan explained. “We designed the communication flow so that Classic McEliece is used where its performance characteristics minimise bandwidth and latency impact.”

That design decision appears to be doing much of the heavy lifting. The main overhead associated with Classic McEliece – the large public key exchange – is handled at session establishment, outside the critical flight window. “Once airborne, the cryptographic workload is lightweight and the data exchanged remains minimal,” Hasan said. “In normal operation, the impact is negligible.”

Those are bold claims in a domain where even small performance penalties can have operational consequences. Drone systems operating in contested environments must already contend with jamming, degraded links, and intermittent connectivity. Any additional burden on bandwidth or power risks reducing range, endurance or reliability. Post-Quantum says testing at STV’s facility confirmed that the system can operate effectively under those conditions, though it is not yet publishing detailed performance data.

The system has been validated in testing, but not yet deployed in live operations. Even so, Hasan argues the gap between trial and deployment is narrow. “We are not claiming live operational deployment today,” he said. “We are claiming a validated, deployment-ready platform with a clear and short path to theatre.”

That confidence rests in part on STV’s position as a supplier whose unmanned systems are already in use in active conflict zones. The company’s ability to deploy platforms directly to theatre without further certification is being presented as a key enabler for rapid adoption, particularly as allied defence programmes look to harden systems against emerging threats.

Chief among those is the so-called “harvest now, decrypt later” risk, which Hasan describes in unequivocal terms. “It is the most immediate and concrete quantum threat in the defence domain, and it is already happening,” he said. “State-level adversaries… are intercepting and storing encrypted communications now. The question is not whether they will attempt this, it is whether the data will still be sensitive when decryption becomes feasible.”

In the case of drone operations, that sensitivity can persist for years. ISR data – from video feeds to telemetry –  may retain intelligence value long after it is captured, particularly in protracted conflicts or when analysing infrastructure and force movements. “A drone procured today may be flying operationally in 2030 or 2035,” Hasan said. “The encryption protecting its communications must be secure not just today but across that entire operational life.”

The argument is that if systems are expected to remain in service for decades, then the cryptography underpinning them must be selected with that lifespan in mind. “Classical encryption cannot provide that assurance,” Hasan said. “Post-quantum cryptography, implemented now, at the point of manufacture, is the only solution.”

Whether defence buyers accept that argument will depend on how the technology performs in real-world conditions beyond controlled trials. However, the work by Post-Quantum and STV suggests that even the most cumbersome forms of post-quantum cryptography may be edging closer to operational reality – not by changing the algorithms themselves, but by rethinking how they are deployed in the systems that depend on them.

Tags: dronePost-QuantumSTV
Previous Post

A BEAM of light for EU sovereignty as Belgium rolls out Matrix-based messaging app for government

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

BEAM App

A BEAM of light for EU sovereignty as Belgium rolls out Matrix-based messaging app for government

byPaul Sawers
March 28, 2026

Belgium is rolling out its own secure messaging platform, as European states step up efforts to bring sensitive communications under...

Shield AI raises $1.5 billion to acquire Aechelon, a military simulation system

Shield AI raises $1.5 billion to acquire Aechelon, a military simulation system

byJohn Biggs
March 27, 2026

Shield AI is raising $1.5 billion in Series G funding at a $12.7 billion valuation, alongside $500 million in preferred...

Inside Ukraine’s plans to become a global military data hub

Inside Ukraine’s plans to become a global military data hub

byThomas Macaulay
March 26, 2026

Ukraine has a new inspector general in its Ministry of Defence: Yurii Myronenko, appointed on Wednesday evening to evaluate the...

Brave1 and NATO Innovation HQ team up to fast track defence tech

Brave1 and NATO Innovation HQ team up to fast track defence tech

byJohn Biggs
March 26, 2026

Brave1, the Ukrainian government’s defence tech accelerator, is working with NATO Innovation HQ and the NATO Communications and Information Agency...

It’s all happening in Riihimäki

It’s all happening in Riihimäki

byFiona Alston
March 26, 2026

Since reporting on the expansion of Define (Defence Innovation Network Finland) earlier this year there has been a smorgasbord of...

C-UAS tech likely to see only a ‘limited’ role in Iran conflict, say startups

C-UAS tech likely to see only a ‘limited’ role in Iran conflict, say startups

byTom Pashbyand1 others
March 24, 2026

Innovative, low-cost uncrewed aerial system (UAS) technology is at the centre of Iran’s response in the Middle East to the...

Meet the company preparing for a world without GPS

Meet the company preparing for a world without GPS

byJohn Biggs
March 23, 2026

The modern world runs on signals most people never see. GPS, the world's position system, now guides trucks, times financial...

How the Element CEO secured communications in thirty-four countries

How the Element CEO secured communications in thirty-four countries

byJohn Biggs
March 23, 2026

https://youtu.be/G9c3SAGx3HU Matthew Hodgson has spent more than a decade working on a question most people never think to ask: what...

Load More

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.