Data shelf-life: 15+ years
Harvest-now decrypt-later is active today
Adversaries can capture encrypted telemetry now and decrypt it when cryptographically relevant quantum computers mature.
Qbitel EdgeOS is a Rust-based edge runtime engineered for long-lifecycle systems that cannot wait for retrofitted security. Native PQC, hardware-rooted identity, and deterministic execution are built into the core.
Threat Pressure
EdgeOS Signal Board
PQC Algorithms
ML-KEM-768, ML-DSA-65, FN-DSA-512
Runtime Model
Rust no_std, zero-heap deterministic core
Identity Primitive
PUF/eFUSE certificate-less trust
The security gap is not hypothetical. It is a lifecycle mismatch between deployed devices and rapidly evolving decryption capability.
Data shelf-life: 15+ years
Adversaries can capture encrypted telemetry now and decrypt it when cryptographically relevant quantum computers mature.
Operational lifespan: 15-30 years
Field devices in energy, rail, water, and defense remain deployed for decades, while RSA and ECC timelines keep shrinking.
Transition window: 2030-2035
Migration programs are aligned to NIST FIPS 203/204 and NSA CNSA 2.0 requirements across 2030-2035 windows.
The stack is intentionally modular: cryptography, identity, attestation, recovery, and updates are isolated for independent validation and release control.
Design Constraints
No heap allocation, deterministic scheduling, hardware-anchored identity.
q-boot
Secure bootloader with anti-rollback OTP counters and measured startup chain.
q-kernel
Deterministic microkernel designed for no-heap, resource-constrained operation.
q-crypto
Built-in NIST-standardized PQC primitives with constant-time implementations.
q-hal
Hardware abstraction for MCU families and board-level secure peripherals.
q-identity
Physical unclonable function identity for certificate-less device trust.
q-attest
Remote attestation and signed posture proofs for fleet verification.
q-update
OTA and air-gapped update channels with policy-gated key rotation.
q-mesh
Secure mesh networking optimized for constrained links and hostile environments.
q-recover
Cryptographic key recovery and rotation flows for incident containment.
q-common
Shared primitives, errors, and contract types across all crates.
Each crate can be inspected, tested, and integrated independently without compromising the full trust model.
q-boot
Secure startup
Measured boot sequence and immutable trust anchors for device startup.
q-kernel
Realtime control
Minimal microkernel scheduler tuned for hard realtime behavior and safety.
q-crypto
Cryptographic core
PQC algorithms and key-exchange APIs for handshake and firmware security.
q-identity
Identity anchoring
PUF and eFUSE identity primitives for unique device-level trust roots.
q-attest
Attestation
Remote attestation proofs for control plane policy validation.
q-update
Update safety
Signed update workflow with anti-rollback and staged release capability.
q-mesh
Edge networking
Secure mesh packet handling and link-level authenticated transport.
q-recover
Incident recovery
Compromised-key response workflow with deterministic recovery playbooks.
q-hal
Hardware adapters
Board and silicon adaptation interfaces for industrial hardware targets.
q-common
Shared primitives
Common types, defensive utilities, and low-level shared runtime helpers.
Algorithms are integrated into the runtime core for deterministic, constant-time operations on constrained microcontroller targets.
| Algorithm | Standard | Purpose | Security | Performance |
|---|---|---|---|---|
| ML-KEM-768 | FIPS 203 | Key encapsulation | NIST Level 3 | Balanced for edge |
| ML-DSA-65 | FIPS 204 | Digital signatures | NIST Level 3 | Fleet signing ready |
| FN-DSA-512 | Falcon family | Compact signatures | NIST Level 1+ | Latency-optimized |
ML-KEM-768
Key encapsulation
ML-DSA-65
Digital signatures
FN-DSA-512
Compact signatures
The runtime is optimized for constrained edge devices where uptime, timing predictability, and identity trust are non-negotiable.
Entire runtime is written in Rust with deterministic memory behavior.
Device trust is anchored in PUF/eFUSE roots rather than external certificate chains.
Anti-rollback counters and signed firmware pipelines protect long-lived infrastructure fleets.
Qbitel EdgeOS is tailored for critical infrastructure categories where cryptographic failure directly affects safety, continuity, and national resilience.
Protect smart meters, DER controllers, and substation gateways against delayed decryption attacks.
Secure signaling controllers and trackside equipment with attestable software supply chains.
Establish resilient identity and encrypted telemetry for high-assurance field nodes.
Harden PLC-connected systems and industrial gateways with deterministic secure runtimes.
Protect remote utility endpoints with cryptographic agility and air-gapped updates.
Example pipelines demonstrate how to combine PQC, identity attestation, and secure lifecycle operations under production-like constraints.
grid-attestation
Provision identity, attest firmware, and enforce policy before control messages are accepted.
Blocks unauthorized firmware from joining the substation network.
$ cargo run --example grid-attestation --release
rail-secure-update
Demonstrates signed firmware rollout with rollback resistance for rail signaling nodes.
Maintains deterministic timing while applying staged secure updates.
$ cargo run --example rail-secure-update --release
airgap-patch-flow
Uses offline artifact signing and physically transferred bundles for isolated utility zones.
Supports compliant patching without persistent internet connectivity.
$ cargo run --example airgap-patch-flow --release
Tooling is designed for manufacturing lines, controlled environments, and field operations where policy and auditability are first-class requirements.
Firmware signing toolchain for release artifacts, SBOM binding, and key policy enforcement.
Install
$ pip install q-sign
Sign firmware
$ q-sign sign --in firmware.bin --profile prod-grid
Verify package
$ q-sign verify --in firmware.bin.signed
Factory and field provisioning CLI for identity enrollment and secure manufacturing workflows.
Install
$ pip install q-provision
Enroll PUF identity
$ q-provision enroll --device /dev/ttyUSB0 --mode puf
Issue policy bundle
$ q-provision bundle --tier critical --out device.bundle
These commands form a practical starting path for build, validation, and device provisioning.
Clone repository
$ git clone https://github.com/yazhsab/qbitel-edgeos.git
Start from the reference implementation and docs.
Build secure runtime
$ cargo build --release --target thumbv7em-none-eabihf
Compiles no_std Rust runtime and core security crates.
Run host validation tests
$ cargo test -p q-crypto -p q-identity --release
Checks PQC and identity flows before flashing hardware.
Provision and flash
$ q-provision enroll --device /dev/ttyUSB0 && q-sign sign --in firmware.bin
Binds hardware identity and signs firmware for deployment.
Transition plans and technical controls are mapped against evolving public standards and domain-specific requirements.
ML-KEM key encapsulation
Active now
ML-DSA digital signatures
Active now
National security transition profile
2030 target alignment
Industrial control systems security
Roadmap integration
Railway safety and communication
Domain validation phase
Offline secure update compliance
Operationally deployed