Topic

Funding Opportunities

Icon: back arrowBack to Funding Opportunities Search

Quantum-Resistant Blockchain Architecture and Quantum Scaling Opportunities for Defense Operations

Seal of the Agency: DOD

Funding Agency

DOD

USAF

Year: 2025

Topic Number: AF25D-T006

Solicitation Number: 25.D

Tagged as:

STTR

BOTH

Solicitation Status: Open

NOTE: The Solicitations and topics listed on this site are copies from the various SBIR agency solicitations and are not necessarily the latest and most up-to-date. For this reason, you should use the agency link listed below which will take you directly to the appropriate agency server where you can read the official version of this solicitation and download the appropriate forms and rules.

View Official Solicitation

Release Schedule

  1. Release Date
    May 7, 2025

  2. Open Date
    May 7, 2025

  3. Due Date(s)

  4. Close Date
    June 25, 2025

Description

TECHNOLOGY AREAS: Trusted AI and Autonomy; Advanced Computing and Software; Hypersonics; Quantum Science; Integrated Network System-of-Systems; Sustainment & Logistics; Mission Readiness & Disaster Preparedness; Advanced Infrastructure & Advanced Manufacturing OBJECTIVE: This Phase I project will undertake a structured design and feasibility assessment to explore advanced security techniques and innovative computing applications that enhance data processing and AI capabilities within existing defense initiatives. Collaborating closely with key stakeholders, the performer will develop system architectures and technical specifications that meet essential requirements for secure, scalable computing within existing systems. The design phase will target two essential capabilities critical for future operational needs. The primary objective will be to develop robust security protocols and establish specifications for safeguarding networks. Additionally, the project will explore advanced graph processing and AI applications to optimize situational awareness and comprehensive multi-domain analysis. A feasibility assessment will evaluate the effectiveness of existing techniques to counter emerging data threats. The performer will examine computational demands, integration challenges, and technical risks to guide future development, establishing baseline security, processing efficiency, and operational effectiveness metrics. Through close collaboration with stakeholders, the assessment will align with specific operational constraints. The study will result in detailed system architecture documentation, including interface specifications, data flow diagrams, and security protocols in line with established standards and infrastructure needs. This documentation will outline comprehensive technical requirements and validation protocols necessary for independent testing. The project will also consider the technical demands of evolving AI applications and assess how existing systems might need to adapt for scalability and resilience. The Phase I final report will present thorough development plans and validation protocols that leverage available resources. This Phase I effort will establish a solid technical foundation for prototype development in Phase II while laying out clear pathways for future deployment. The performer will provide stakeholders with a technical roadmap for advancing these critical capabilities by delivering comprehensive designs and feasibility analyses. Specifically, Phase II will focus on implementing proof-of-concept models based on Phase I designs, refining prototypes using testing facilities and specialized validation environments, and working closely with digital transformation initiatives. DESCRIPTION: To meet the objective of this Phase I STTR project, the performer will assess the feasibility of quantum-resistant blockchain solutions to address risks and opportunities posed by quantum computing. The project will focus on designing and evaluating quantum-resistant cryptographic techniques, examining their compatibility with existing systems, and scaling them within the existing environment. The goals are to (1) develop a secure system architecture that withstands quantum threats and (2) establish a roadmap for scaling Quantum technologies within existing systems to enhance DAF preparedness. The first component involves implementing quantum-resistant cryptographic protocols securing critical military communications, data channels, and transactional integrity on blockchain and other systems used inexisting systems. These protocols differ from traditional methods vulnerable to quantum attacks by using mathematical structures secure against quantum decryption. This project will focus on lattice-based cryptography, hash-based signatures, and code-based cryptography, chosen for their applicability in securing military data flows and meeting DAF performance standards. Lattice-based cryptography, especially the Learning with Errors (LWE) problem, uses lattices to create secure encryption schemes and digital signatures. It offers strong resistance to quantum attacks and supports various military applications. This project will analyze the trade-offs between security and performance, optimizing lattice-based encryption for operational efficiency while maintaining high security standards. Feasibility studies will measure encryption and decryption speeds, memory requirements, and overall system impact to ensure these methods can be deployed without compromising mission-critical capabilities. Hash-based signatures are another quantum-resistant approach for securing communications and transaction integrity. They are advantageous for environments requiring rapid verification and short-term validity, such as battlefield or airborne communication systems. These systems resist quantum computational attacks without reliance on complex number-theoretic problems. This project will evaluate hash-based signatures for application in secure message transmission and transaction validation in blockchain applications. Practical considerations will include signature generation and verification times, storage requirements, and impact on data transmission latency. For DAF, where secure and efficient communication protocols are imperative, hash-based signatures offer a promising solution for real-time performance within distributed networks. Code-based cryptography uses error-correcting codes for encryption, decryption, and other protocols, resisting quantum attacks. This approach is secure due to the complexity of its underlying mathematical problems. Although it involves large public keys and significant storage, it is suitable for securing long-term data transmission and storage. This project will assess code-based cryptography for applications requiring high levels of confidentiality, such as secure transmission of operational plans, satellite data, and sensitive intelligence. Efforts will focus on optimizing code-based schemes for military applications by examining compression techniques, key management strategies, and integration methods with DAF infrastructure to mitigate resource demands. The design phase will also explore developing hybrid cryptographic architectures, combining classical and quantum-resistant elements. Hybrid models offer a balanced solution for current operational needs and future security requirements. Hybrid encryption schemes may use classical methods for routine communications and quantum-resistant protocols for sensitive data. This layered approach addresses computational bottlenecks while ensuring critical data protection against future quantum-based threats. Once these techniques are identified and evaluated, the performer will conduct a design and feasibility analysis of graph processing and AI applications tailored to defense-specific use cases in a quantum environment, including their scaling potential within existing systems. This Phase I effort will lay the groundwork for a secure, adaptable system ensuring robust protection and compatibility with evolving quantum processing capabilities. PHASE I: The project will evaluate scalable quantum-resilient methods, focusing on: 1.Layered Encryption and Data Partitioning Framework: Develop a multi-layered encryption model using quantum-resistant protocols to isolate vulnerabilities. Simulation testing will validate scalability and security in diverse operational scenarios. 2.Post-Quantum Key Management Infrastructure: Design a secure, scalable key management system using quantum-safe methods to protect cryptographic keys and ensure data integrity across distributed networks. 3.Adaptive, Modular Defense Architecture: Employing software-defined networking (SDN), develop an adaptive architecture for real-time updates to quantum-safe encryption protocols, ensuring future scalability and compatibility with defense requirements. Phase I will deliver feasibility studies, initial designs, and prototype frameworks to establish a robust quantum-safe defense infrastructure tailored to DAF requirements. Phase I Deliverables The feasibility study will provide system architecture documentation, including interface specifications, data flow diagrams, and security protocols meeting DAF standards. This will guide Phase II prototype development, supported by a roadmap for implementing quantum-resistant blockchain and quantum-enhanced AI. Phase Roadmap • Phase I: Foundational research, system design, and feasibility analysis. Deliver comprehensive system documentation and validation protocols. • Phase II: Develop prototypes, conduct rigorous testing in government facilities, and refine quantum-resistant methods and AI capabilities for defense needs. • Phase III: Deploy systems in operational settings and commercialize products for broader markets. Include training programs and technical support for DAF personnel. Tasks and Timelines Task 1: Research and Analysis of Quantum-Resistant Cryptography (Month 1) Objective: Assess lattice-based, code-based, and hash-based cryptographic techniques for security, efficiency, and compatibility with military needs. Activities: • Review current research on cryptographic methods for defense applications. • Evaluate each method’s resilience to quantum threats and computational demands. • Analyze compatibility with military encryption standards. • Deliverable: Comprehensive report on cryptographic suitability for Phase II development. Task 2: Design of Quantum-Resistant Blockchain Architecture (Month 2) Objective: Develop a Proof-of-Authority (PoA) blockchain architecture with quantum-resistant protocols. Activities: • Define security, performance, and scalability requirements. • Design secure data flow paths and consensus mechanisms. • Plan integration with Quantum Key Distribution (QKD) for key exchange. Deliverable: System architecture documentation with high-level design diagrams and technical specifications. Task 3: Design Scalable Quantum-Resilient Architecture (Month 4) Objective: Create a scalable cryptographic architecture for secure, data-intensive defense applications. Activities: • Define scalability requirements for throughput, storage, and latency. • Address bottlenecks in applying quantum-safe cryptographic methods. • Develop a multi-layered encryption framework tailored to defense needs. Deliverable: Technical design document outlining encryption strategies and scalability considerations. Task 4: Feasibility Assessment and Prototype Planning (Month 6) Objective: Validate Phase I designs and establish baseline metrics for quantum-resistant solutions. Activities: • Evaluate computational needs for blockchain and AI models. • Test resilience of selected protocols against quantum threats. • Identify integration challenges with existing DoD systems. • Develop a roadmap with key milestones and risk mitigation strategies. Deliverable: Feasibility assessment report detailing technical challenges and recommendations for Phase II. Task 5: Preparation of Phase II Development Plan (Month 8) Objective: Outline the resources, infrastructure, and timeline for Phase II prototype development. Activities: • Integrate Phase I findings into the Phase II work plan. • Establish timelines, milestones, and risk mitigation strategies for prototype development and testing. Deliverable: Detailed Phase II development plan covering objectives, protocols, and deployment timelines. Commercialization and Defense Integration The quantum-resistant blockchain solution will transition from defense-focused applications to private-sector markets like finance, healthcare, and energy. Key commercialization goals include enhanced security, scalability, and resilience to quantum threats. Dual-use pathways will maximize value across sectors, ensuring a strategic advantage for DAF and broader industry adoption. This project’s outcomes will deliver quantum-ready defense capabilities, secure mission-critical operations, and ensure technology PHASE II: Phase II will transition concepts from Phase I into a functional prototype meeting DAF's operational and security standards, focusing on quantum-resistant cryptography for military environments. This section outlines objectives, expectations, operating parameters, testing requirements, and success criteria for Phase II. Objectives and Expectations The main goal is to deliver a deployable prototype of a quantum-resistant blockchain system for existing systems. Built on a Proof of Authority (PoA) blockchain with post-quantum cryptographic protocols, Phase II aims for operational readiness through thorough testing across security, performance, and interoperability metrics. Prototyping Expectations The prototype will handle high data throughput, low-latency processing, and computational efficiency for real-time operations. Key areas include blockchain transaction speed and consensus protocol latency, optimized for scalability and minimal latency while maintaining strong security. Testing Requirements To validate the prototype, a comprehensive testing regimen will be conducted across security, performance, and interoperability categories: 1. Security Testing: Evaluates quantum-resistant cryptographic protocols against simulated attacks, ensuring data integrity and confidentiality. 2. System Performance Testing: Measures blockchain transaction throughput and latency under load, validating real-time processing capabilities. 3. Interoperability Testing: Ensures integration with existing DAF systems and adherence to communication protocols. 4. Environmental Testing: Assesses robustness and reliability under operational stress conditions. Success Criteria The success of Phase II will be measured against defined criteria to ensure that the prototype meets or exceeds DAF operational requirements: 1. Quantum-Resistant Security: The prototype’s cryptographic protocols must demonstrate resilience to quantum and classical attack simulations, effectively securing communications and data. Success will be achieved if the prototype can maintain data integrity and confidentiality under high-threat conditions, indicating strong resistance to quantum-based decryption attempts. 2. Operational Efficiency: The prototype must meet predefined performance metrics for data throughput and latency, ensuring it can handle the real-time demands of the emerging battlefield data analysis. Operational efficiency will be assessed by measuring the system’s ability to achieve required processing speeds without significant delays, even under high-load conditions. 3. System Scalability and Resilience: The prototype must demonstrate scalability to handle multi-node environments and resilience in adverse conditions, maintaining operational functionality across distributed networks. Environmental stress testing will assess this criterion, verifying the system’s capacity to maintain performance and security across scalable, multi-node configurations. 4. Seamless Integration: The prototype should be interoperable with existing DAF systems, passing all interoperability testing benchmarks and demonstrating compatibility with established military communication and security protocols. Success will be achieved if it can seamlessly. Expected Deliverables The primary deliverable is a validated, fully operational prototype of the quantum-resistant blockchain for existing systems, accompanied by technical documentation, a System Performance and Security Report, and a Phase III Transition Plan. Training materials will prepare DAF personnel for system operation and maintenance. PHASE III DUAL USE APPLICATIONS: In Phase III, the quantum-resistant blockchain solution developed in Phase II will be prepared for operational deployment in defense and commercial environments. This phase focuses on scaling, integration, and security for military use, while establishing dual-use commercialization pathways. Efforts will target high-performance, quantum-resistant data requirements of the DAF and other defense sectors, enabling broader adoption across government and industry. Upon completion, the solution will deliver secure, scalable quantum-resistant blockchain technology for defense and commercial sectors. Deployments in DAF environments and commercial markets will set a new standard for secure, real-time data processing across quantum-threatened domains, protecting mission-critical information. Expected Phase III Effort Phase III will focus on deployment and integration within DAF environments, emphasizing: • Operational Integration: Deploying the blockchain across military nodes to ensure secure, real-time data sharing. Full integration within DAF systems will validate performance in live defense settings. • Advanced Scalability: Enhancing the blockchain to support large-scale, high-throughput operations under diverse network conditions, meeting DAF demands in geographically distributed environments. • Interoperability and Transition Planning: Ensuring compatibility with DAF communication frameworks and securing necessary approvals for data security and cryptographic compliance. • Dual-Use Optimization: Adapting for commercial sectors like finance, energy, and healthcare. Compliance with standards like SOC 2, HIPAA, and ISO 27001 will support broader commercialization. Technology Readiness Level (TRL) The solution is expected to enter Phase III at TRL 6 (demonstrated in a relevant environment) and progress to TRL 8 (qualified in operational environments), ready for full deployment. Transition Planning and Approvals • DoD and DAF Compliance: Securing certifications to meet quantum-resilient data security and interoperability standards. • Interagency Coordination: Collaborating with DoD agencies to ensure compatibility with defense systems and communication protocols. Additional Customer Opportunities • Multi-Domain Battlefield Management: Providing secure, quantum-resistant communication for real-time decision-making and data integration. • Intelligence, Surveillance, and Reconnaissance (ISR): Protecting sensitive data in hostile environments through secure, low-latency data sharing. • Command and Control (C2) Systems: Enhancing secure, real-time communication to support rapid decision-making in dynamic operations. • Logistics and Supply Chain Management: Improving tracking and authenticity with tamper-resistant records, reducing vulnerabilities in global supply chains. Commercialization Strategy The primary targets include the broader DoD and high-security commercial sectors such as finance, healthcare, and energy, where quantum-resilient solutions are critical. Key efforts: • Securing DoD certifications to position the solution for quantum-safe applications in battlefield management and data security. • Adapting to meet regulatory standards (SOC 2, HIPAA, ISO 27001) to ensure commercial viability. • Partnering with defense contractors and tech firms to integrate into secure ecosystems, offering training, operational support, and user resources. Commercialization Potential This blockchain technology has significant potential in sectors requiring quantum-safe solutions, including finance, healthcare, energy, and critical infrastructure. Key advantages include: • Finance: Enhanced protection for secure transactions and regulatory compliance, supporting high transaction throughput with low latency. • Healthcare: Protecting patient records and enabling secure data sharing, aligning with stringent privacy standards. • Cross-Sector Integration: High scalability and adaptability for various regulatory frameworks enable licensing and partnerships, positioning the solution as a foundational layer in secure digital infrastructures. By addressing these needs, the solution ensures robust, future-proof security for quantum-resilient digital ecosystems in government and industry. REFERENCES: 1. Fernandez-Carames, T. M., & Fraga-Lamas, P. (2024). "Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks." arXiv preprint arXiv:2402.00922. 2. Allende, M., et al. (2021). "Quantum-resistance in blockchain networks." Scientific Reports, 11, 1-12. 3. National Security Agency (NSA). (2022). "The Commercial National Security Algorithm Suite 2.0 and Quantum Computing FAQ." 4. White House. (2022). "National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems." 5. Kumar, A., et al. (2024). "Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real-Time Applications." SpringerLink. 6. Kumar, A., et al. (2023). "Quantum Resilience and Distributed Trust: The Promise of Blockchain and Quantum Computing in Defense Applications." SpringerLink. 7. Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and National Institute of Standards and Technology (NIST). (2023). "Quantum-Readiness: Migration to Post-Quantum Cryptography." 8. National Security Agency (NSA). (2023). "Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now." KEYWORDS: Quantum Computing, Post-Quantum Cryptography, Quantum Blockchain, Quantum-Resistant Security, Artificial Intelligence (AI), Graph Processing, Multi-Domain Battlefield Analysis, Data Integrity