Blog

Making quantum-safe security work in demanding, real-world environments

Written by Arqit | Feb 10, 2026 11:38:42 AM

Digital and data sovereignty are rising sharply on the agenda.

Particularly in the EU and UK, driven by regulations like DORA and NIS2… and perhaps a sense that old assumptions on global alliances and shared infrastructure may need to be reconsidered.

Organizations are also waking up to the control they’ve surrendered to infrastructure providers.

And it’s not just about the public cloud. We increasingly need to exercise control over our data and workloads no matter where they are located.

 

The rising need for digital and data sovereignty

And at this point, can we really expect to repatriate all of our data and workloads?

How much functionality and convenience would we have to give up to achieve that? Can we even achieve that? Would the inconvenience and disruption be accepted?

Probably not. Which begs the questions:

  • How do we achieve digital and data sovereignty without taking such drastic steps?
  • And how do we maintain it as we edge closer and closer to a post-quantum world?

Daniel Shiu, Cryptography Consultant at Arqit, describes the end goal like this:

“Good data sovereignty means being able to store data on third party infrastructure encrypted with keys you alone control, with strong assurance that providers can’t bypass that, and the ability to protect data not only at rest and in transit but also during processing.”

Fortunately, this is possible. In fact, we can share three examples where quantum-safe security has been implemented successfully in demanding, real-world environments.

 

Example 1: Quantum Safe over Internet (QSI)

Let’s start with one of the most performance-intensive environments going: telcos.

Arqit and Sparkle demonstrated quantum resilient data transmission for optical networks over Sparkle’s metropolitan optical ring in Athens, protecting a high-capacity network segment without harming performance.

Basically, the QSI initiative combines Arqit’s encryption tech with Sparkle’s infrastructure. It enables Zero Trust-compliant connectivity between any two points… and it’s fully quantum-safe.

Some of the highlights include:

  • Optical-Layer Quantum-Safe Encryption: operates directly on optical transponders, integrating post-quantum encryption into the physical layer.
  • High-Capacity and Scalable: supports multi-100G optical links and scales as needed.
  • No physical changes to optical hardware: offers a practical, ready-to-deploy solution that doesn’t require expensive optical hardware changes.

You can read all about it here.

 

Example 2: Post-quantum security for military applications

Warfighting networks require serious security while retaining maximum performance and flexibility.

Integrating post-quantum cryptography is a high priority, as Roberta Faux, US Head of Cryptography and Field CTO at Arqit, explains:

“Encryption must be part of the weapon or system design from the outset, not like plumbing wrapped around it later. The modern battlespace is full of drones, autonomous sensors, soldier worn devices, and AI at the edge. All of this demands lightweight, agile suites of crypto solutions.”

But it’s not the only requirement. Military organizations need:

  1. Quantum-safe encryption for data in transit (to resist CRQCs),
  2. …that doesn’t rely on Type 1 hardware encryption products,
  3. …is compatible with Zero Trust principles (e.g., continuous authentication),
  4. …works for remote mobile and IoMT devices, including on untrusted networks,
  5. … and is flexible, lightweight, and hyper-scalable enough for dynamic, real-world use.

Intel, Equus, and Arqit have created the first quantum-safe architecture for secure mobile access to classified data. It allows fully secure communications between military devices and hardware, even on untrusted networks.

The solution uses NSA’s Mobile Access Capability Package (MACP) and CSfC Enterprise Gray architecture, with symmetric key encryption that doesn’t rely on hardware devices, and doesn’t require extra network and device resources.

It looks like this:

The key components are:

  • strongSwan, an open-source VPN library, creates an out-of-the-box quantum-safe VPN.
  • SKA-Platform allows IPsec tunnel endpoints to generate quantum-safe symmetric keys.
  • Intel® hardware was used to deliver the data plane and cryptography performance.

The CSfC-compliant MACP solution described here is quantum-safe, operationally scalable, and suitable to secure confidential military data in transit anywhere in the world.

You can read more about it here.

 

Example 3: Secure AI workloads in the public cloud

So that’s infrastructure and the military covered. What about a typical organization that wants to keep using public cloud infrastructure… but reclaim its digital sovereignty?

An organization like this needs three things:

  1. Data must be encrypted at rest.
  2. Data must be encrypted in transit.
  3. Data must be encrypted while in use.

The first two points are straightforward. They can be achieved using quantum-resistant cryptography and, say, an IPsec VPN tunnel. There are various ways to do this, but being biased, we’d suggest our own SKA-Platform and NetworkSecure.

The third point hasn’t previously been possible.

However, Intel and Arqit have developed a solution that allows any organization to tick all three boxes while remaining easily scalable and without increasing latency.

It has two components:

  • Intel’s Trust Domain Extensions (TDX), a hardware technology in modern Xeon processors, isolates workloads from the underlying infrastructure by encrypting data while it’s in use.
  • Arqit’s SKA-Platform and NetworkSecure agent integrate with network infrastructure to provide on-demand quantum-safe shared symmetric keys.

The end result: even if data is observed, stored, exfiltrated, or otherwise compromised by anyone, it will remain safely encrypted even in a post-quantum world.

Here’s what the solution looks like:

All data is encrypted at all times, and encryption keys are never visible to the cloud host. The solution is also high-performance, so it’s functionally invisible to users. That means any organization can get complete data and digital sovereignty… without repatriation.

You can read all about it here.

 

Quantum-safe digital sovereignty has landed

These are just a few ways that modern encryption can be deployed to secure data and workloads in the real world. This stuff is no longer theoretical. It’s in use right now to solve problems and protect data and assets in complex, fast-moving, and critical environments.

To discuss how we can help solve your security challenges, get in touch.

 

 

10 February 2026