Security Architecture
Nation-state adversaries are harvesting today's encrypted traffic to decrypt when quantum computers arrive. ntkVDI uses NIST-standardized post-quantum algorithms in every session — not as an upgrade, but as the default foundation.
Cryptographic Core
CRYSTALS-Kyber · FIPS 203
Kyber-1024 replaces ECDH for session key establishment. Based on the Module Learning With Errors (MLWE) lattice problem, which has no known efficient quantum algorithm.
CRYSTALS-Dilithium · FIPS 204
Dilithium5 signs every authentication message, preventing man-in-the-middle forgery. Replaces ECDSA signatures throughout the control stream handshake.
Zero-Trust Model
Traditional VDI grants access at login and trusts until logout. ntkVDI verifies cryptographic identity at each session initiation. A stolen credential cannot pivot because there's no implicit standing access.
Threat Model Summary
Adversaries store ciphertext for future quantum decryption. Defeated by Kyber-1024: no known quantum speedup against MLWE.
Impersonation during key exchange. Defeated by Dilithium5 signatures — forgery requires solving Module-LWE, computationally infeasible classically or quantumly.
Compromised credential reuse across sessions. Per-session key derivation means a stolen long-term credential cannot reuse any prior session key material.
Legacy VDI: compromise the broker, own all sessions. ntkVDI: there is no broker. The NTK access point handles auth; no single network node has session visibility.
If the endpoint running the Flutter client is fully compromised, screen content is visible to the attacker. Mitigated by endpoint posture checks (roadmap).
Physical access to the VDI host. Scope-limited: keys are per-session and zeroized on close. Full-disk encryption on the host is required but outside ntkVDI scope.
Compliance Posture
| Framework | Relevant Controls | ntkVDI Status | Notes |
|---|---|---|---|
| NIST SP 800-207 (Zero Trust) | PE-3, AC-17, IA-3 | Aligned | Per-session re-auth, no standing network access |
| NIST PQC (FIPS 203/204) | Kyber / Dilithium | Native | Not an add-on; baked into control stream |
| FIPS 140-3 | Cryptographic module validation | In Progress | Target: CMVP submission Q3 2026 |
| SOC 2 Type II | CC6, CC7 (Logical access, monitoring) | In Progress | Audit period begins Q2 2026 |
| ISO/IEC 27001 | A.9 (Access control), A.10 (Cryptography) | Aligned | Control mapping complete |
| GDPR / CCPA | Data minimization, encryption at rest/transit | Aligned | No session data persisted beyond session lifetime |