Qrypt Brings Quantum Security to NVIDIA Jetson

BLAST Protocol and quantum-entropy key generation now extend protection from the data center to Orin Nano and Thor edge AI platforms.

Qrypt announced it has brought its BLAST Protocol and quantum-entropy key generation to the NVIDIA Jetson edge AI platform, including Jetson Orin Nano and Jetson Thor. The integration extends quantum-secure encryption from NVIDIA BlueField DPUs in the AI factory to Jetson endpoints at the edge, providing a single security architecture from the data center to deployed robotics and autonomous systems.

The BLAST Protocol, developed by Qrypt Chief Cryptographer Yevgeniy Dodis, replaces conventional key-distribution architectures. Traditional encryption relies on a structure where encryption keys and data are bound in the same channel. BLAST instead generates identical encryption keys independently at each endpoint from quantum entropy. Because no key ever crosses a network, the primary point of interception is removed.

As edge AI moves into safety-critical environments such as robotics fleets and remote industrial monitoring, sensitive data and AI models are pushed outside the protection of the data center. These devices often remain deployed for a decade or more, making them targets for "harvest now, decrypt later" attacks, where adversaries capture encrypted data today to break it once quantum computing matures.

"AI is moving from the data center to the edge, and the security requirements are moving with it," said Denis Mandich, Qrypt co-founder and CTO. "Organizations building on Jetson need encryption that’s quantum-ready on day one, not something they have to retrofit after deployment."

The integration across the NVIDIA platform stack includes a custom Yocto Project kernel tailored to the target device. For Orin Nano, Qrypt developed a kernel upgrade from Linux 5.15 to 6.6 to meet modern security requirements.

These foundations are paired with Qrypt’s CNSA 2.0 and NIST-aligned cryptography stack. The hardware quantum random number generators are NIST ESV certified, utilizing quantum entropy sourced through licensing agreements with Oak Ridge and Los Alamos National Laboratories.

"With BLAST on NVIDIA Jetson, a robotics fleet or a critical infrastructure operator gets the same quantum-secure protection as a national security mission, from a single architecture that scales from the edge to the AI factory," said Kevin Chalker, CEO and co-founder of Qrypt.

The BLAST Protocol is now available on NVIDIA Jetson Orin Nano and Jetson Thor through Qrypt’s early access integration program.

About the Author

Jesse Jacobs is assistant editor of SecurityToday.com.

Featured

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.