Bundeswehr network already encrypted in a quantum-resistant manner

B2B Cyber ​​Security ShortNews
Advertising

Share post

While many companies are still discussing quantum resistance, the Bundeswehr's 13.000 kilometer long fiber optic network is quantum-resistant encrypted. The cryptography solution is approved by the BSI up to “VS-NfD” and enables bandwidths of up to 100 Gbit/s.

Over the past three years, BWI has completely modernized the Bundeswehr's wide area network. The new core network, the so-called backbone, of the nationwide fiber optic network is not only significantly more powerful. It is also quantum-resistant encrypted and approved by the BSI up to “VS-NfD”.

Advertising

VS-NfD: classified information – for official use only

The entire voice and data communication of the Bundeswehr in this country takes place via a redundant fiber optic network that is around 13.000 kilometers long. In order to meet the increasing demands of the armed forces, BWI has completely modernized the core network over the past three years and prepared it for the quantum age. The first quantum computers could be on the market as early as the early 2030s. They will be millions of times more powerful than conventional systems. And they will be able to break encryption methods used today. That is why the Bundeswehr and BWI are investigating the possibilities of quantum technologies, including in the area of ​​cryptography. The first solution has now arrived in practice: the new backbone of the Bundeswehr's wide area network now has encryption that would also withstand future quantum computers.

More security and automation

Around 800 Bundeswehr properties are connected to the fiber optic core network. In order to optimally protect the transmitted data today and in the future, BWI is now using quantum-safe encryption technology in the backbone. This “post-quantum cryptography”, PQC for short, is used by default and cannot be switched off.

Advertising

The solution is approved by the Federal Office for Information Security (BSI) up to the transmission of information in the protection class “classified information – for official use only” (VS-NfD). With a fiber monitoring system, the entire fiber optic infrastructure can be automated and monitored. Specifically, this means detecting, localizing and reporting fiber breaks or other disorders. In addition to greater security, the system enables, among other things, more efficient interference suppression.

More at BWI.de

 


About BWI

BWI is one of the largest IT service companies in Germany. In peace, crisis and war it provides for
the Bundeswehr provides stable, secure and efficient IT services at home and abroad. In this way, it contributes to the continuous increase in the command and operational capability and combat effectiveness of the armed forces.


 

Matching articles on the topic

Faulty ASUS software allows malware installations 

The pre-installed ASUS DriverHub software contains a critical security vulnerability that allows remote code execution of malware. Due to the faulty checking of ➡ Read more

Play ransomware exploits Windows zero-day vulnerability 

According to Symantec, the Play ransomware group and allied groups are using an exploit that targets the zero-day vulnerability CVE-2025-29824. The vulnerability was ➡ Read more

Samsung server software attacked by exploit

A vulnerability was discovered in Samsung MagicINFO 9 in August 2024. After a research report was published in April, ➡ Read more

MITRE CVE program remains in place for the time being

The CVE program, funded by the US government, is considered a crucial component in the global detection of software flaws. Now, funding is to be temporarily suspended. ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more