Increasing digitization has exposed these networks to new risks. According to a report by Eurelectric published in November 2024, cyberattacks in the European energy sector doubled between 2020 and 2022, with 48 known public attacks recorded, of which 15 directly affected power grid operating systems.(smartgridsinfo.es)
In addition, there has been an increase in attacks targeting strategic agencies, such as police forces and emergency control centers, with the aim of interfering with the ability to respond to critical situations.
In this context, securing tactical communications has ceased to be a technical option and has become a strategic imperative that guarantees operational efficiency and continuity, the protection of lives and national technological sovereignty.
Current status of encrypted communications
Organizations that manage critical infrastructure or provide essential services often implement a variety of measures to secure their tactical communications:
Independent encryptors
Encryptors, devices or programs that encrypt information, are widely used to protect data in transit. However, if used in isolation, management and scalability problems can arise. It is therefore vital that encryptors are fully integrated into security systems with multiple coordinated elements that enable an effective and reliable response.
The keys
The security of an encryption system depends to a large extent on the proper management of cryptographic keys. This requires a centralized and secure system for the generation, storage and distribution of these keys, being the only way to mitigate the risks of exposure and protect our encrypted communications.
Means of transfer
Another challenge for organizations is to have secure mechanisms for the transfer of keys from the management system to the encryptors, without opening security loopholes that compromise our communications. Currently, we avoid these breaches by retiring obsolete devices and protocols that do not meet the latest security requirements, to prevent our keys from being intercepted or manipulated.
Implementation of integral cryptosystems
To adopt a holistic approach to securing our tactical communications, we propose the creation of comprehensive cryptosystems that ensure complete protection of all encrypted communications. The different components that make up our cryptosystem must be properly interconnected to work harmoniously, ensuring information security at all times.
A cryptosystem is therefore not simply an independent encryption device working on its own; it is an overall ecosystem with a security architecture composed of technologies, procedures and policies that work together to protect encrypted communications in highly demanding operational scenarios. The key advantage of an end-to-end cryptosystem is its ability to adapt to different environments (military, civilian, industrial) as well as different platforms (naval, land, air) without compromising security or interoperability.
Essential components of a cryptosystem
- Encryptor: The encryptors that make up a cryptosystem must be able to operate on multiple platforms and adapt to different environments, guaranteeing the protection of information regardless of the transmission medium. These devices must have security certifications, update and configuration capabilities and resistance to physical or logical attacks.
- Centralized management system: Allows the management and configuration of encryption equipment, as well as the efficient and secure administration of cryptographic keys. It is crucial that this system includes automated key rotation and revocation policies, as well as granular audit trails and access control to prevent misuse or internal leaks.
- Secure key loader: The task of the key loader must be that of a reliable bridge between the management system and the encryptors. Its design must include the ability to transmit data under a secure communication interface, as well as multifactor authentication mechanisms to increase security and a high resistance to physical and logical attacks, allowing the protection of cryptographic keys as a critical element in our chain of trust.
In addition to these three pillars, a cryptosystem must be modular and scalable, allowing the incorporation of new functionalities as threats evolve or operational requirements change. It must also facilitate interoperability with allied systems or those of different national agencies, without compromising the confidentiality of information.
The integration of these systems provides a robust, end-to-end solution to protect tactical encrypted communications in critical sectors, law enforcement, emergency services and other entities that need to operate in real time under adverse conditions.
CERBERUS: The solution to ensure information security
In response to the current challenges in cybersecurity, Cipherbit-Oesia Group has developed CERBERUSa comprehensive cryptographic solution designed and manufactured entirely in Spain. This high performance equipment allows securing tactical communications in complex and demanding environments.
CERBERUS is designed to ensure the confidentiality of data and voice flows on airborne, naval and land-based platforms, through different channels (such as serial, IP or radio).
Its development, in compliance with the strictest security requirements, allows its operability both at national level and in the rest of the NATO allies. In fact, its use has already been adopted by the Spanish Ministry of Defense, consolidating it as a key system in the protection of critical infrastructures, military networks and security organizations.
With the launch of CERBERUS, Cipherbit-Grupo Oesía reinforces its commitment to the development of sovereign technology, aimed at strengthening the national response capacity to increasingly sophisticated threats.
Lourdes Velasco, Director of Strategy and Business Development of Cipherbit-Grupo Oesía.