There are technologies that are created to solve a current problem… and others that are designed with a threat that does not yet exist in mind. The first “quantum technology” drone clearly belongs to the second category. The reality is that it doesn’t fly better, faster, or farther. What it does is something much more subtle: protect your information from an enemy that has not yet arrived: the quantum computer.
To understand what makes this new type of drone special, it is worth starting with what it is not. It is not a drone that works with quantum physics in its flight. It does not use qubits to stabilize or entanglement to navigate. The revolution is somewhere else: in how it is communicated. In essence, we are looking at the first drone designed to be “quantum safe.”
Behind this concept there is a very real concern in the world of cybersecurity. Today, most of our communications, including those from military systems or drones, are protected by algorithms such as RSA or elliptic curve cryptography. They work because, With today’s computers, breaking them would take thousands of years. But a sufficiently powerful quantum computer could do it in a matter of hours. This is what is known as the “Q-Day” problem: the day when current cryptography is no longer secure. And this is where the technology of this drone comes in.
The system has been developed by European companies such as STV Group and Post-Quantum, and its key innovation is to integrate a type of encryption called Classic McEliece directly into its communications. This algorithm is not new. It was proposed in 1978, but for decades it was considered impractical. The reason is almost ironic: it was too safe… and too heavy.
Its cryptographic keys are huge compared to those of current systems, which made it difficult to use on devices with limited resources, such as a drone. And yet, that is precisely what makes it valuable today. Unlike many modern systems, Classic McEliece is based on mathematical problems that even quantum computers cannot easily solve. In other words: it is designed to survive the future.
The real achievement is having made this algorithm “fly”. For years, experts thought that this type of cryptography was unviable in environments with weight, energy and bandwidth limitations. But Recent tests carried out in the Czech Republic (STDV group headquarters) have shown the opposite: The system can be integrated into real drones without compromising its operation. And that changes the scenario.
Because a drone is not just a machine that flies. It is an information node. Capture video, transmit data, receive orders. All of that travels through the air, potentially exposed. With this system, each of that data, from telemetry to real-time video, can be encrypted so that it remains secure even if someone intercepts it today to decrypt it ten years from now.
This type of threat even has a name: harvest now, decrypt later. Intercept now, break later. The drone is designed precisely to avoid this. But there is something even more interesting in how this technology has been applied. It is not about converting the entire system into a quantum environment, but about Protect what is essential: critical communications. Encryption is applied to video, images and mission metadata, that is, what really matters in an operational context. The basis is to shield your language.
Strictly speaking, the term quantum here is not 100% accurate. It does not use quantum phenomena directly, as photon-based quantum cryptography would. But it is closely linked to that future. Drones manufactured today may still be operational in ten or fifteen years. And that means your security systems must be designed for a world that doesn’t yet exist. A world where quantum computers could read what we believe to be protected today.
The platform combines combat-proven unmanned aerial systems with post-quantum encryption, with the aim of ensuring both communications between drones and between operators in highly conflictive environments. This includes regions where jamming, signal interception, and GPS denial are common.Those responsible plan to implement the technology in phases in allied defense programs, with additional tests on systems already deployed in areas of operations.