top of page

Quantum Resistant Architecture

Quantum Ninjas: Cryptographic Agility at Machine Speed
Carnegie Mellon University
Department of Defense

Final In-Class Presentation


At Carnegie Mellon University, four students set out to solve a problem that many still view as theoretical. The rise of quantum computing threatens to undermine the foundations of modern encryption, and the Department of Defense isn’t ready. Most systems today rely on public key cryptography that quantum algorithms could break in minutes. What the Army needed was not just a post-quantum algorithm. It needed a system that could evolve as fast as the threat.

What Was at Stake

Their sponsor was clear: secure communications systems must remain functional and protected in a post-quantum world. That doesn’t just mean switching algorithms once. It means enabling continuous cryptographic upgrades over time—without rebuilding everything from scratch.

Stakeholder organizational chart
Stakeholder organizational chart

Most current DoD platforms are brittle. Encryption schemes are hard-coded. Hardware is inflexible. And changes to algorithms often require entire system rewrites, opening operational risk and delaying deployments. In short, the DoD lacks cryptographic agility.


The Quantum Ninjas reframed the problem. Instead of proposing a single post-quantum fix, they built a modular pathway toward long-term resilience.

MVPs That Scale With the Mission

The team delivered three distinct MVPs, each targeting a key technical barrier and mapped to different TRL milestones:

  • MVP 1: Post-Quantum Encryption Wrapper  A working proof-of-concept in Python that allows developers to swap between multiple PQC algorithms including Kyber, Dilithium, Falcon, and legacy RSA—without touching application you havent completed code. This early-stage prototype targeted TRL 3 by demonstrating proof-of-concept functionality in a controlled lab environment.

  • The first MVP - Testing Algorithms with Python
    The first MVP - Testing Algorithms with Python

  • MVP 2: Dynamic Encryption Selection Interface  A simulated GUI allowing users to choose or update encryption methods in real-time during a communication session. This layer tested usability, threat model alignment, and field-deployable flexibility. It advanced into TRL 4 by validating component integration and subsystem performance under test conditions.


Together, these MVPs built a scaffold for cryptographic evolution—focusing not on a singular solution, but on ensuring systems can adapt as quantum capabilities, algorithms, and standards change.

Operators of Another Kind

The Quantum Ninjas were Swetha Thotakura, Meet Patel, Darius Taylor, and Yuvanshu Agarwal.

  • Swetha Thotakura is pursuing a B.S. in Information Systems with a minor in Artificial Intelligence. She led technical development of the encryption wrapper and managed core systems architecture.

  • Meet Patel, a cybersecurity professional earning his M.S. in Information Security Policy and Management, designed performance benchmarks and mapped cryptographic risks to policy implications.

  • Darius Taylor, a B.S. candidate in Information Systems, brought sharp research instincts and led the team’s early-stage interviews, ensuring every prototype was grounded in stakeholder reality.

  • Yuvanshu Agarwal, pursuing an M.S. in Information Systems Management with a focus on Business Intelligence, designed the dynamic user interface and led system-level modeling for satellite-ground simulation.

Individually, they brought technical skill. Together, they built a systems-level approach to one of the most complex challenges in modern defense.

Beyond Compliance

From the beginning, the team understood that quantum-safe encryption wasn’t just a compliance requirement. It was an operational necessity. Their approach went beyond standards like NIST’s PQC shortlist. They built for speed, modularity, and future interoperability.


Their sponsors validated that agility is now a priority mission need. Whether in satellite comms, soldier-carried radios, or ground control stations, encryption must become as fluid as the data it protects.

What It Meant

In the world of defense innovation, most teams look for a better lock. The Quantum Ninjas built a better way to upgrade the lock without replacing the door.


Persistent Systems MPU5 Radio for future MVP tests
Persistent Systems MPU5 Radio for future MVP tests

Their work modeled a path for cryptographic resilience at TRL 3–5, showing how new systems can evolve ahead of adversarial breakthroughs. The team left the course with an actionable roadmap, sponsor interest, and a clear view of what operational integration might require.


They weren’t just building encryption software. They were designing the agility the next generation of defense systems will demand.

Explore More Funded Technologies

Automated Defense Manufacturing Workflows
Adaptive Camouflage to Unmapped Terrain
Tactical High-Altitude Balloon Launch Playbook
Self-healing Battlefield Communications
Containerized Water Systems
Live Communication Signal Analytics
Decision Authority for Global Conflict
Predictive Critical Mineral Supply Chains
Modular Swarm Undersea Payload

Washington DC | Palo Alto CA

Common Mission Project is a registered 501(c)(3) nonprofit organization |  Tax ID: 81-2345565

SIGN UP FOR OUR NEWSLETTER

© 2025 by Common Mission Project All rights reserved.

bottom of page