Workshops Defence Securing C2 Command and Control
Defence Deep Dive Session

Securing C2 (Command and Control) Systems

Command and control systems are the highest-value targets in any military network. C2 message integrity, authentication, and confidentiality depend on cryptographic algorithms that quantum computers will break. This session examines PQC migration specifically for C2 architectures: JADC2 multi-domain connectivity, SATCOM uplinks, tactical data links, and the unique challenges of crypto-agility in systems designed for 20-30 year operational lifespans.

Half day (3 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

C2 systems present unique PQC migration challenges. They span multiple classification levels, connect diverse platforms (air, land, sea, space, cyber), and must maintain interoperability across coalition partners with different migration timelines. The Joint All-Domain Command and Control (JADC2) vision increases cryptographic complexity by connecting previously isolated networks. Every C2 message path requires authentication (who sent it), integrity (was it altered), and often confidentiality (can adversaries read it). All three properties currently depend on RSA, ECDSA, or ECDH.

This workshop addresses PQC migration for C2 systems at the architecture level. Participants examine where classical cryptography appears in C2 message flows (link encryption, message signing, session establishment, certificate chains), assess the PQC algorithm candidates best suited to each C2 communication pattern, and develop migration sequencing that maintains operational capability throughout the transition. The session covers SATCOM link protection, Link 16/22 authentication constraints, and crypto-agility design principles for C2 systems expected to operate beyond 2050.

What participants cover

  • C2 cryptographic dependency mapping: authentication, integrity, and confidentiality across message flows
  • JADC2 multi-domain PQC challenges: connecting air, land, sea, space, and cyber with quantum-safe crypto
  • SATCOM C2 link protection: ML-KEM for key exchange and ML-DSA for command authentication
  • Link 16/22 PQC integration: message format constraints and backward-compatible migration approaches
  • Crypto-agility for C2: algorithm-independent message handling for 30+ year system lifespans
  • Coalition interoperability: managing PQC migration across allies with different timelines and standards

Preliminary Agenda

Deep Dive Session structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 C2 Architecture and Quantum Vulnerability Where cryptography protects command and control
  • C2 message flow analysis: authentication, integrity, and confidentiality at each link
  • JADC2 connectivity model: multi-domain, multi-classification, multi-coalition cryptographic requirements
  • CNSA 2.0 implications for national security C2 systems: 2030 and 2035 migration deadlines
2 PQC for C2 Communications Algorithm selection and protocol integration
  • ML-KEM for C2 session establishment: parameter selection for different bandwidth constraints
  • ML-DSA for command authentication: signature size impact on C2 message throughput
  • SLH-DSA for long-lived C2 certificates: hash-based conservative security for root CAs
  • SATCOM and Link 16/22 specific integration challenges and protocol-level adaptations
Break, after 60 min
3 Crypto-Agility and Long-Term Resilience Designing C2 systems for algorithm transitions
  • Crypto-agility architecture: algorithm-negotiation protocols and pluggable cryptographic modules
  • Key management for multi-domain operations: pre-positioned keys, ephemeral exchange, and revocation
  • Testing methodology: C2 system PQC migration validation without disrupting operational capability
4 Discussion and Next Steps Planning your C2 PQC migration
  • Migration sequencing: which C2 links to migrate first based on HNDL exposure and criticality
  • Coalition coordination: NATO STANAG alignment and bilateral interoperability agreements for PQC

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DE

Defence Sector Partners

Domain expertise and operational validation

Defence workshops are co-delivered with sector specialists who bring direct operational experience in defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us