The problem
What today's M2M auth can't deliver in defence.
Defence and national-security M2M authentication has historically relied on PKI under a national authority and bespoke per-platform key-management schemes. Both assume reach-back to a key authority that contested operations cannot guarantee. The post-quantum migration further pressures these architectures: many in-service platforms will outlive RSA and ECDSA in the field.
How EdSSA addresses it
What EdSSA does differently here.
EdSSA Nano provides authentication that holds without reach-back, sustains operations through contested communications, and is post-quantum from first handshake. The architecture is sovereign by design — built and operated in the EU, with NIST and ETSI primitives only. Swarm and Relay extensions cover multi-platform mission-set realities (drones, vehicles, soldier-worn comms, naval and submarine operations).
Use cases
Concrete operational scenarios.
- Coalition operation authentication where partners do not share a national PKI authority
- Forward-deployed asset authentication during contested communications
- Submarine-to-surface authentication tolerant of acoustic-link constraints
- Cross-domain authentication between air, ground, sea, and space platforms
Compliance & standards
Standards and regulatory regimes.
NIS2 alignment. CNSA 2.0 post-quantum mandate. EU defence cooperation framework. Sovereign supply chain. NATO STANAG-compatible at architectural level.
Audit emission
Audit logging configurable from silent operation to full per-event trace for incident response. Optional integrity-protected log storage compatible with CC EAL evaluation regimes and national-defence audit requirements.
Customers
Operators in this vertical.
“Reach-back to a national PKI is the assumption we needed to drop. EdSSA dropped it for us.”