SHACE – Super High Assurance Cryptographic Endpoint

Project SHACE by AIC is a Raspberry Pi–based high-assurance cryptographic endpoint offering FIDO2 seeding, post-quantum readiness, and policy-driven packet encryption for edge and in-chain deployments — a sovereign, software-defined alternative to traditional hardware encryptors.

Category

Commercial

Category

Commercial

Category

Commercial

Client

Internal R&D / Defence

Client

Internal R&D / Defence

Client

Internal R&D / Defence

Services

Embedded, Crypto Architecture, Policy Engine

Services

Embedded, Crypto Architecture, Policy Engine

Services

Embedded, Crypto Architecture, Policy Engine

Location

UK / Lab

Location

UK / Lab

Location

UK / Lab

Year

2025

Year

2025

Year

2025

TRL

5

TRL

5

TRL

5

Overview

Project SHACE (Super High Assurance Cryptographic Endpoint) is AIC’s next-generation, Raspberry Pi–based cryptographic endpoint platform — a compact, software-defined alternative to traditional hardware encryptors and MiniCAT-class devices.

Designed for edge, tactical, and in-chain network deployments, SHACE provides selective packet encryption, FIDO2 seeding, and post-quantum cryptography (PQC) readiness, establishing a robust, verifiable trust perimeter in hostile or bandwidth-constrained environments.

Built on AIC’s zero-trust architecture and hardened Linux kernel, SHACE delivers cryptographic assurance at the data-flow layer — encrypting only what policy dictates, when and where it’s required.
Whether deployed as a gateway, relay, or chain node, SHACE ensures that every packet, identity, and handshake is provably authentic, integrity-checked, and recoverable under mission-grade conditions.

Mission

To redefine endpoint cryptography by combining the assurance of certified hardware with the agility of software-defined encryption, empowering operators to protect critical data at the edge without dependence on proprietary hardware or closed ecosystems.

Core Capabilities

  • Policy-Driven Packet Encryption – Apply fine-grained encryption and routing rules (Decrypt-and-Forward, Relay-Without-Decrypt, Rewrap-and-Relay).

  • FIDO2 Seeding & Credential Injection – Bootstraps trusted keys using FIDO2 hardware tokens for identity provenance and operator accountability.

  • Post-Quantum Readiness (PQC) – Incorporates hybrid key exchange using NIST-candidate algorithms (Kyber, Dilithium) for long-term resilience.

  • Chain & Edge Modes – Operates as a standalone node, chain link, or distributed mesh endpoint for secure data transit.

  • Device-Level Isolation – Sandboxed crypto services prevent key exfiltration or side-channel leakage.

  • Full Telemetry & Audit – Cryptographic operations logged, hashed, and time-stamped for forensic validation.

  • Cross-Domain Gateway – Bridges clean/dirty networks with sanitisation, packet rewrapping, and metadata enforcement.

  • Offline Key Roll & Re-Provisioning – Supports complete air-gapped rekeying cycles with encrypted configuration payloads.

Technical Architecture

Layer

Function

Key Technologies

Hardware Layer

Secure compute base

Raspberry Pi 5 / CM4, TPM 2.0, Secure Boot

OS & Runtime

Hardened minimal kernel

Ubuntu Core + AppArmor / SELinux

Crypto Core

Encryption, signing, PQC operations

OpenSSL 3.2 +, liboqs, ECDSA / X25519 / Kyber

Policy Engine

Defines per-flow encryption & routing

YAML / JSON policy schema

FIDO2 Seed Service

Hardware-based identity root

YubiKey, FIDO2 API

Comms Stack

Encrypted packet transport

WireGuard / TLS 1.3 / gRPC

Management API

Remote control & telemetry

REST / gRPC / WebSocket

Audit Ledger

Immutable log of cryptographic events

SHA-256 chains, MongoDB Atlas Ledger Collections

Operational Modes

  1. Edge-to-Edge: Two or more SHACE endpoints create a secure link between field nodes and command systems.

  2. Edge-Chain: Multiple chained devices relay encrypted traffic, rewrapping keys and enforcing hop-by-hop policy validation.

  3. In-Chain: Intermediate node performing policy-driven inspection, re-encryption, or routing under strict governance.

Security & Compliance

SHACE is engineered to satisfy and exceed the assurance expectations of:

  • NCSC CPA Foundation & Commercial Product Assurance (target alignment)

  • NIST FIPS 140-3 cryptographic module standards

  • ISO 19790 / 27001 information security controls

  • UK MoD JSP 440 / 604 cross-domain and protective security guidelines

  • Zero Trust Architecture (NIST SP 800-207) principles

Every deployed unit operates with sealed configuration, immutable logs, and cryptographically bound firmware hashes, providing end-to-end provenance and anti-tamper assurance.

Use Cases

  • Deployed Edge Encryption: Portable protection for tactical networks, vehicles, and forward operating nodes.

  • Cross-Domain Bridging: Controlled transfer between clean, dirty, or coalition networks.

  • Industrial IoT Security: Drop-in cryptographic enforcement for OT and SCADA gateways.

  • Secure Relay Clients: Acts as encryption front-end for AIC’s Content Distribution Portal or other clean-cloud systems.

  • Sovereign Data Transmission: Ensures national data flows remain verifiable and recoverable without foreign dependencies.

Strategic Value

Project SHACE defines a new category of high-assurance cryptographic endpoints — blending the portability of Raspberry Pi hardware with the rigour of certified encryption stacks.
It offers Defence, Government, and Critical Infrastructure operators an independent, sovereign path to deploy cryptographic trust wherever data moves — without reliance on third-party HSMs or vendor-locked encryptors.

By aligning with AIC’s Zero-Trust and Clean-Cloud architecture, SHACE completes the trust chain between the edge, the cloud, and the command node, providing a software-defined, hardware-hardened encryption platform built entirely under UK control.

Overview

Project SHACE (Super High Assurance Cryptographic Endpoint) is AIC’s next-generation, Raspberry Pi–based cryptographic endpoint platform — a compact, software-defined alternative to traditional hardware encryptors and MiniCAT-class devices.

Designed for edge, tactical, and in-chain network deployments, SHACE provides selective packet encryption, FIDO2 seeding, and post-quantum cryptography (PQC) readiness, establishing a robust, verifiable trust perimeter in hostile or bandwidth-constrained environments.

Built on AIC’s zero-trust architecture and hardened Linux kernel, SHACE delivers cryptographic assurance at the data-flow layer — encrypting only what policy dictates, when and where it’s required.
Whether deployed as a gateway, relay, or chain node, SHACE ensures that every packet, identity, and handshake is provably authentic, integrity-checked, and recoverable under mission-grade conditions.

Mission

To redefine endpoint cryptography by combining the assurance of certified hardware with the agility of software-defined encryption, empowering operators to protect critical data at the edge without dependence on proprietary hardware or closed ecosystems.

Core Capabilities

  • Policy-Driven Packet Encryption – Apply fine-grained encryption and routing rules (Decrypt-and-Forward, Relay-Without-Decrypt, Rewrap-and-Relay).

  • FIDO2 Seeding & Credential Injection – Bootstraps trusted keys using FIDO2 hardware tokens for identity provenance and operator accountability.

  • Post-Quantum Readiness (PQC) – Incorporates hybrid key exchange using NIST-candidate algorithms (Kyber, Dilithium) for long-term resilience.

  • Chain & Edge Modes – Operates as a standalone node, chain link, or distributed mesh endpoint for secure data transit.

  • Device-Level Isolation – Sandboxed crypto services prevent key exfiltration or side-channel leakage.

  • Full Telemetry & Audit – Cryptographic operations logged, hashed, and time-stamped for forensic validation.

  • Cross-Domain Gateway – Bridges clean/dirty networks with sanitisation, packet rewrapping, and metadata enforcement.

  • Offline Key Roll & Re-Provisioning – Supports complete air-gapped rekeying cycles with encrypted configuration payloads.

Technical Architecture

Layer

Function

Key Technologies

Hardware Layer

Secure compute base

Raspberry Pi 5 / CM4, TPM 2.0, Secure Boot

OS & Runtime

Hardened minimal kernel

Ubuntu Core + AppArmor / SELinux

Crypto Core

Encryption, signing, PQC operations

OpenSSL 3.2 +, liboqs, ECDSA / X25519 / Kyber

Policy Engine

Defines per-flow encryption & routing

YAML / JSON policy schema

FIDO2 Seed Service

Hardware-based identity root

YubiKey, FIDO2 API

Comms Stack

Encrypted packet transport

WireGuard / TLS 1.3 / gRPC

Management API

Remote control & telemetry

REST / gRPC / WebSocket

Audit Ledger

Immutable log of cryptographic events

SHA-256 chains, MongoDB Atlas Ledger Collections

Operational Modes

  1. Edge-to-Edge: Two or more SHACE endpoints create a secure link between field nodes and command systems.

  2. Edge-Chain: Multiple chained devices relay encrypted traffic, rewrapping keys and enforcing hop-by-hop policy validation.

  3. In-Chain: Intermediate node performing policy-driven inspection, re-encryption, or routing under strict governance.

Security & Compliance

SHACE is engineered to satisfy and exceed the assurance expectations of:

  • NCSC CPA Foundation & Commercial Product Assurance (target alignment)

  • NIST FIPS 140-3 cryptographic module standards

  • ISO 19790 / 27001 information security controls

  • UK MoD JSP 440 / 604 cross-domain and protective security guidelines

  • Zero Trust Architecture (NIST SP 800-207) principles

Every deployed unit operates with sealed configuration, immutable logs, and cryptographically bound firmware hashes, providing end-to-end provenance and anti-tamper assurance.

Use Cases

  • Deployed Edge Encryption: Portable protection for tactical networks, vehicles, and forward operating nodes.

  • Cross-Domain Bridging: Controlled transfer between clean, dirty, or coalition networks.

  • Industrial IoT Security: Drop-in cryptographic enforcement for OT and SCADA gateways.

  • Secure Relay Clients: Acts as encryption front-end for AIC’s Content Distribution Portal or other clean-cloud systems.

  • Sovereign Data Transmission: Ensures national data flows remain verifiable and recoverable without foreign dependencies.

Strategic Value

Project SHACE defines a new category of high-assurance cryptographic endpoints — blending the portability of Raspberry Pi hardware with the rigour of certified encryption stacks.
It offers Defence, Government, and Critical Infrastructure operators an independent, sovereign path to deploy cryptographic trust wherever data moves — without reliance on third-party HSMs or vendor-locked encryptors.

By aligning with AIC’s Zero-Trust and Clean-Cloud architecture, SHACE completes the trust chain between the edge, the cloud, and the command node, providing a software-defined, hardware-hardened encryption platform built entirely under UK control.

Overview

Project SHACE (Super High Assurance Cryptographic Endpoint) is AIC’s next-generation, Raspberry Pi–based cryptographic endpoint platform — a compact, software-defined alternative to traditional hardware encryptors and MiniCAT-class devices.

Designed for edge, tactical, and in-chain network deployments, SHACE provides selective packet encryption, FIDO2 seeding, and post-quantum cryptography (PQC) readiness, establishing a robust, verifiable trust perimeter in hostile or bandwidth-constrained environments.

Built on AIC’s zero-trust architecture and hardened Linux kernel, SHACE delivers cryptographic assurance at the data-flow layer — encrypting only what policy dictates, when and where it’s required.
Whether deployed as a gateway, relay, or chain node, SHACE ensures that every packet, identity, and handshake is provably authentic, integrity-checked, and recoverable under mission-grade conditions.

Mission

To redefine endpoint cryptography by combining the assurance of certified hardware with the agility of software-defined encryption, empowering operators to protect critical data at the edge without dependence on proprietary hardware or closed ecosystems.

Core Capabilities

  • Policy-Driven Packet Encryption – Apply fine-grained encryption and routing rules (Decrypt-and-Forward, Relay-Without-Decrypt, Rewrap-and-Relay).

  • FIDO2 Seeding & Credential Injection – Bootstraps trusted keys using FIDO2 hardware tokens for identity provenance and operator accountability.

  • Post-Quantum Readiness (PQC) – Incorporates hybrid key exchange using NIST-candidate algorithms (Kyber, Dilithium) for long-term resilience.

  • Chain & Edge Modes – Operates as a standalone node, chain link, or distributed mesh endpoint for secure data transit.

  • Device-Level Isolation – Sandboxed crypto services prevent key exfiltration or side-channel leakage.

  • Full Telemetry & Audit – Cryptographic operations logged, hashed, and time-stamped for forensic validation.

  • Cross-Domain Gateway – Bridges clean/dirty networks with sanitisation, packet rewrapping, and metadata enforcement.

  • Offline Key Roll & Re-Provisioning – Supports complete air-gapped rekeying cycles with encrypted configuration payloads.

Technical Architecture

Layer

Function

Key Technologies

Hardware Layer

Secure compute base

Raspberry Pi 5 / CM4, TPM 2.0, Secure Boot

OS & Runtime

Hardened minimal kernel

Ubuntu Core + AppArmor / SELinux

Crypto Core

Encryption, signing, PQC operations

OpenSSL 3.2 +, liboqs, ECDSA / X25519 / Kyber

Policy Engine

Defines per-flow encryption & routing

YAML / JSON policy schema

FIDO2 Seed Service

Hardware-based identity root

YubiKey, FIDO2 API

Comms Stack

Encrypted packet transport

WireGuard / TLS 1.3 / gRPC

Management API

Remote control & telemetry

REST / gRPC / WebSocket

Audit Ledger

Immutable log of cryptographic events

SHA-256 chains, MongoDB Atlas Ledger Collections

Operational Modes

  1. Edge-to-Edge: Two or more SHACE endpoints create a secure link between field nodes and command systems.

  2. Edge-Chain: Multiple chained devices relay encrypted traffic, rewrapping keys and enforcing hop-by-hop policy validation.

  3. In-Chain: Intermediate node performing policy-driven inspection, re-encryption, or routing under strict governance.

Security & Compliance

SHACE is engineered to satisfy and exceed the assurance expectations of:

  • NCSC CPA Foundation & Commercial Product Assurance (target alignment)

  • NIST FIPS 140-3 cryptographic module standards

  • ISO 19790 / 27001 information security controls

  • UK MoD JSP 440 / 604 cross-domain and protective security guidelines

  • Zero Trust Architecture (NIST SP 800-207) principles

Every deployed unit operates with sealed configuration, immutable logs, and cryptographically bound firmware hashes, providing end-to-end provenance and anti-tamper assurance.

Use Cases

  • Deployed Edge Encryption: Portable protection for tactical networks, vehicles, and forward operating nodes.

  • Cross-Domain Bridging: Controlled transfer between clean, dirty, or coalition networks.

  • Industrial IoT Security: Drop-in cryptographic enforcement for OT and SCADA gateways.

  • Secure Relay Clients: Acts as encryption front-end for AIC’s Content Distribution Portal or other clean-cloud systems.

  • Sovereign Data Transmission: Ensures national data flows remain verifiable and recoverable without foreign dependencies.

Strategic Value

Project SHACE defines a new category of high-assurance cryptographic endpoints — blending the portability of Raspberry Pi hardware with the rigour of certified encryption stacks.
It offers Defence, Government, and Critical Infrastructure operators an independent, sovereign path to deploy cryptographic trust wherever data moves — without reliance on third-party HSMs or vendor-locked encryptors.

By aligning with AIC’s Zero-Trust and Clean-Cloud architecture, SHACE completes the trust chain between the edge, the cloud, and the command node, providing a software-defined, hardware-hardened encryption platform built entirely under UK control.

Let’s Shape the Future of Industry Together

Strategic consultancy, secure technology, and mission-ready expertise, connect with AIC to deliver change where it matters most.

Let’s Shape the Future of Industry Together

Strategic consultancy, secure technology, and mission-ready expertise, connect with AIC to deliver change where it matters most.

Let’s Shape the Future of Industry Together

Strategic consultancy, secure technology, and mission-ready expertise, connect with AIC to deliver change where it matters most.