Workshop Description
Intelligence field communications encompass covert radio systems, satellite communication terminals (both dedicated and commercial), encrypted messaging devices, and increasingly, internet-based covert channels. Each system type faces different PQC migration challenges. Covert radios operate on extremely narrow bandwidths where ML-KEM ciphertext sizes (768-1568 bytes) may exceed available capacity. Burst transmissions require authentication within millisecond windows. Denied-area operations may not permit real-time key exchange at all.
This workshop examines PQC deployment for each intelligence field communication type: algorithm selection for bandwidth-constrained covert channels, pre-positioned key strategies for denied-area operations, hybrid deployment for systems that must interoperate with classical equipment, and the specific challenge of protecting agent communications where compromise has immediate human consequences. The interactive demonstration models PQC overhead impact on representative intelligence communication scenarios.
What participants cover
- ML-KEM and ML-DSA for bandwidth-constrained covert communication channels
- Burst transmission authentication: PQC signing within millisecond transmission windows
- Denied-area key management: pre-positioned PQC key material and emergency re-keying protocols
- Satellite link protection: PQC for intelligence SATCOM including commercial and dedicated terminals
- Agent communication security: PQC migration for systems where compromise exposes human sources
- Hybrid deployment for interoperability with classical intelligence communication equipment