Government & Defense

Classified communications and citizen services with post-quantum protection

Governments move in decade-long cycles: a classified document today has a 25-50 year lifespan. The NSA has published CNSA 2.0 mandating full PQC transition by 2035, starting 2027 for new systems. The EU with eIDAS 2.0 and eu-wallet requires qualified signatures that remain verifiable even after Q-Day. Without PQC today, eID credentials issued now will not be legally sustainable in 15 years.

25-50 yrs
classified retention
CNSA 2.0
NSA compliance
eIDAS 2.0
EU compliance
2035
full deadline
PosQuantum · Government & Defense

Three scenarios where PosQuantum acts

1

Inter-ministerial VPN with network separation (MLS)

Context

Defense Ministry connecting 14 bases to a central HQ. Traffic classified RESTRICTED/CONFIDENTIAL/SECRET. Requirement: NIST + ETSI accredited crypto.

Risk

IPsec with IKEv2 + ECDSA — all handshake material is harvestable. SECRET-classified traffic encrypted today must be considered compromised post-Q-Day.

PosQuantum solution

PQSL Secure Channel as L3 overlay on IPsec: hybrid handshake X25519 + ML-KEM-1024 + ChaCha20-Poly1305. Bidirectional deterministic rekeying every 1M messages or 30min (whichever first). Common Criteria EAL4+ pipeline compatible.

2

Long-term qualified-signature citizen eID

Context

National CA issues qualified-signature certificates (QSCD) for 4M citizens. Signed documents legally valid for 30+ years (wills, deeds).

Risk

Current RSA-3072 certificates — valid today, legally invalid post-Q-Day. Signatures stored at notary will lack forensic proof.

PosQuantum solution

Crypto-agility at the CA: dual issuance (RSA + ML-DSA-65). Notarial PUCE Archive stores manifest signed by both — preserves mathematical evidence even if RSA falls. AdES BASELINE-LT (long-term validation) compatible.

3

Video conferencing for government cabinets

Context

Classified video conferencing for prime ministers + cabinets (dedicated Jabber/Webex-type). Encrypted traffic subject to foreign SIGINT interception.

Risk

SFU with SRTP-GCM + DTLS. DTLS uses ECDHE — trivial harvest-now-decrypt-later for a state adversary.

PosQuantum solution

PUCE Stream with TTL-PQC playback tokens. PQC-hybrid handshake between participants. Recording to PUCE Archive with legislative retention (15 years for Cabinet minutes).

Reference architecture

1

1. PQ identity

CA issues ML-DSA-65 certificates alongside RSA (dual-stack).

2

2. VPN overlay

PQSL Secure Channel over existing MPLS / IPsec.

3

3. Rich comms

PUCE Stream for video conferencing + PUCE Archive for recording.

4

4. Compliance

Dashboard generates automatic CNSA 2.0 / eIDAS 2.0 reports for internal audit.

5

5. Key escrow

Government HSM + split-key (Shamir 3-of-5) for PQ key recovery.

Applicable PosQuantum products

PQSL Enterprise
PUCE Archive
PUCE Stream
Secure Channel
Compliance Dashboard

Regulatory compliance covered

CNSA 2.0NIST SP 800-208ETSI TS 119 312eIDAS 2.0NIS2FIPS 140-3

CNSA 2.0 / eIDAS 2.0 transition plan for your agency?

We offer a 1-day technical workshop for government CISO teams — system mapping + quick-wins + 24-month roadmap.