Classical public-key cryptography underpins every secure satellite link today, and it is provably broken the moment a sufficiently powerful quantum computer exists. The threat is not theoretical: adversaries already harvest encrypted traffic for later decryption, meaning data transmitted now over vulnerable links is already compromised in a 'store now, decrypt later' attack. Sovereign operators who depend on foreign satellite services have no visibility into, let alone control over, when or whether those providers will migrate their cryptographic stack.
Post-quantum communications replaces RSA, ECDH and classical TLS handshakes with NIST-standardised algorithms—CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium for digital signatures—embedded directly in the satellite's onboard communications processor and mirrored in the ground segment. A constellation of microsatellites running software-defined radios allows cryptographic modules to be patched over-the-air as standards evolve, avoiding the hardware lock-in that plagues purpose-built GEO platforms. The ground network enforces end-to-end PQC from user terminal to operations centre, with no classical cryptography in the path.
The operational outcome is a communications architecture that remains confidential across its entire design lifetime—typically 10-15 years on orbit—regardless of advances in quantum hardware. Sovereign ownership means the nation controls algorithm selection, key management infrastructure and the patch cadence, none of which can be guaranteed when renting capacity from a commercial provider operating under a foreign regulatory and export-control regime.