Back to News
quantum-computing

Qrypt Integrates Quantum-Secure Encryption with NVIDIA Jetson Edge AI Devices

Quantum Daily
Loading...
4 min read
0 likes
⚡ Quantum Brief
Qrypt’s BLAST encryption protocol now integrates with NVIDIA Jetson edge AI devices, including Orin Nano and Thor, enabling quantum-secure end-to-end encryption for robotics, autonomous systems, and critical infrastructure deployments. The BLAST protocol eliminates key transmission vulnerabilities by generating identical encryption keys independently at each endpoint using quantum entropy, preventing network exposure and future "harvest now, decrypt later" attacks from quantum computers. This integration extends Qrypt’s quantum security from NVIDIA BlueField DPUs in data centers to Jetson-powered edge devices, creating a unified architecture without requiring infrastructure overhauls or key management retrofits. Developed by NYU cryptography professor Yevgeniy Dodis, BLAST replaces traditional 1970s key-distribution models, automating key rotation and lifecycle management while meeting CNSA 2.0 and NIST standards. Early access is now available for Jetson Orin Nano and Thor, with Qrypt offering NIST-certified quantum random number generators licensed from Oak Ridge and Los Alamos National Laboratories.
Qrypt Integrates Quantum-Secure Encryption with NVIDIA Jetson Edge AI Devices

Summarize this article with:

Insider Brief Qrypt has integrated its BLAST encryption protocol and quantum-entropy key generation technology with the NVIDIA Jetson edge AI platform to provide quantum-secure encryption from edge devices to data centers. The integration supports devices such as Jetson Orin Nano and Jetson Thor, enabling end-to-end encryption for robotics, autonomous systems, and other edge AI deployments. The BLAST protocol generates identical encryption keys independently at each endpoint using quantum entropy, eliminating the need to transmit encryption keys across networks. PRESS RELEASE — Qrypt, the quantum security company that eliminated encryption key transmission, today announced it has brought its BLAST Protocol end-to-end encryption and quantum-entropy key generation to the NVIDIA Jetson edge AI platform, including Jetson Orin Nano and Jetson Thor. The integration extends Qrypt’s quantum-secure encryption from NVIDIA BlueField DPUs in the AI factory to Jetson endpoints at the edge, giving organizations a single security architecture from the data center to deployed robotics, autonomous systems and critical infrastructure. BLAST is a peer-reviewed cryptographic protocol developed by Qrypt Chief Cryptographer Yevgeniy Dodis, a fellow of the International Association for Cryptologic Research and a professor at New York University. Conventional encryption relies on a key-distribution architecture, originally designed for 1970s telecom networks, that binds encryption keys and encrypted data together in the same channel. Replacing the underlying algorithm, as post-quantum cryptography does, does not resolve this structural weakness, because the new algorithms may themselves need to be replaced as cryptanalysis advances. BLAST takes a fundamentally different approach, replacing the key-distribution architecture itself by generating identical encryption keys independently at each endpoint from quantum entropy. No key ever crosses a network, and the keys are never correlated with the data they protect. The protocol also automates key provisioning, rotation and lifecycle management across large-scale deployments, enabling organizations to secure entire fleets of edge devices without rebuilding their existing infrastructure. Edge AI is accelerating into real-world, safety-critical environments such as robotics fleets, autonomous systems and remote industrial monitoring, pushing sensitive data and AI models outside the protection of the data center. Many of these devices will remain deployed for a decade or more, making them prime targets for “harvest now, decrypt later” attacks in which adversaries capture encrypted data today with the expectation of breaking it once quantum computing matures. “AI is moving from the data center to the edge, and the security requirements are moving with it,” said Denis Mandich, Qrypt co-founder and CTO, who spent 20 years in the US Intelligence Community focused on national security and advanced technology development. “Organizations building on Jetson need encryption that’s quantum-ready on day one, not something they have to retrofit after deployment.” As the only quantum security company in the NVIDIA Inception program, Qrypt integrates across the full NVIDIA platform stack. Each Jetson integration is built on a custom Yocto Project kernel tailored to the target device.

For Orin Nano, Qrypt developed a kernel upgrade from Linux 5.15 to 6.6 to meet modern security requirements ahead of official NVIDIA support. These foundations are paired with Qrypt’s CNSA 2.0 and NIST-aligned cryptography stack. Qrypt’s hardware quantum random number generators are also NIST ESV certified, utilizing quantum entropy sourced through exclusive licensing agreements with Oak Ridge and Los Alamos National Laboratories. “The same level of encryption that protects the most sensitive operations in the intelligence community should be available to every organization deploying AI at the edge,” said Kevin Chalker, CEO and co-founder of Qrypt, a former CIA operative who founded the company to democratize intelligence-grade cryptography. “With BLAST on NVIDIA Jetson, a robotics fleet or a critical infrastructure operator gets the same quantum-secure protection as a national security mission, from a single architecture that scales from the edge to the AI factory.” BLAST Protocol is now available on NVIDIA Jetson Orin Nano and Jetson Thor through Qrypt’s early access integration program. Organizations interested in deploying quantum-secure encryption across Jetson-based edge environments can learn more at qrypt.com/contact.

Mohib Ur Rehman LinkedIn Mohib has been tech-savvy since his teens, always tearing things apart to see how they worked. His curiosity for cybersecurity and privacy evolved from tinkering with code and hardware to writing about the hidden layers of digital life. Now, he brings that same analytical curiosity to quantum technologies, exploring how they will shape the next frontier of computing. Share this article:

Read Original

Tags

telecommunications
post-quantum-cryptography
government-funding
quantum-cryptography
partnership

Source Information

Source: Quantum Daily