Harsh conditions
The Thesis
Centralised credential vaults don’t reach Mars.
Or low Earth orbit. Or a drone swarm under jamming. Or a wind farm 80 km offshore. Or a sealed pharmaceutical container traversing six handlers across three continents. Yet every existing M2M authentication product assumes you can call home to a central authority — that the network is always there, that the auth server always responds, that the cryptography you choose today will still be unbroken in 2045.
EdSSA Nano is a stateless, post-quantum machine-to-machine authentication protocol that needs no central authority in the hot path. Two computing nodes that have spoken once can keep authenticating each other for years — through link drops, jamming, satellite handoffs, multi-day disconnects — without ever calling home. The cryptography is post-quantum from the first handshake. The state lives only in volatile memory. The verification fits in a single CPU cache line.
Post-quantum
Designed for 2045, not 2025
Sovereign by design
Built in Helsinki, for European critical infrastructure
A new paradigm
Structural Authentication.
Existing M2M authentication products fall into two camps: a centralised authority issues tokens and verifies signatures, or two parties exchange a shared secret and renew it on a schedule. Both depend on something you call home for — a vault, a certificate authority, a key management service. When the network is unreliable, contested, or simply not there, both camps degrade.
Structural Authentication is a third category. Two parties bootstrap once via a post-quantum handshake and derive identical state in volatile memory. From that point forward, each side independently constructs the same ephemeral credential from the shared state and from public ambient inputs — and authenticates the counterparty by matching what was independently constructed. There is no central authority in the hot path. There is no per-request call home. There is no shared message that has to traverse the network for authentication to succeed.
We coined the term because no existing category named what we built. DSSA — the protocol behind EdSSA — is the first family in this paradigm. The patent application “Decentralised Stateless Structural Authentication” establishes the umbrella.
What it isn’t
Not a vault. Not a blockchain. Not a PUF.
Who we work with
Operators in markets that the vault model can't serve.
Drone OEMs · Satellite operators · Pharmaceutical logistics · Central banks · Defence integrators · Industrial-edge platforms
DRONES & UAV
Authentication that survives jamming, mesh disconnects, and 50,000-unit swarm scale.
SATELLITE CONSTELLATIONS
Inter-satellite links that authenticate without ground anchor.
DEFENCE & NATIONAL SECURITY
Sovereign-grade post-quantum auth for mission-critical operations.
INDUSTRIAL-EDGE & UTILITIES
Twenty-five-year device lifetime, intermittent backhaul, regulatory tailwind.
PHARMACEUTICAL COLD-CHAIN
Cryptographic chain of custody from manufacturer to patient.
SPECIALISED COURIERS
Organ transplant, evidence custody, diplomatic mail, controlled substances.
CONNECTED VEHICLES (V2X)
Sub-millisecond authentication for cooperative mobility.
SUBSEA & UNDERWATER
Authentication over acoustic links, surfacing-window-tolerant.
SPACE EXPLORATION
Lunar, cislunar, deep-space missions with light-time delays.
CRITICAL INFRASTRUCTURE
Air-gapped, sovereign, post-quantum, audit-grade.
WHOLESALE CBDC & SETTLEMENT
Cross-border CBDC settlement and inter-validator authentication.
TRADE FINANCE
Documentary credit chains with cryptographic provenance.
IMPLANTABLE MEDICAL DEVICES
Authenticated firmware updates, hardware-bound identity, twenty-year device lifetime.
Why EdSSA
Built for the operating envelope you actually run in.
Authentication that runs without a network.
Sub-microsecond verification, in cache.
Post-quantum from the first handshake.
Adaptive resilience without compromise.
As featured in