Autoabode — Industrial 3D Printers & UAV Manufacturer India
Back to Journal
Radio & Comms 11 min readMay 25, 2026

How Encrypted Communication Works Without Internet: A Technical Guide to Off-Grid Secure Messaging

Rohan Sharma

Head of Avionics, Autoabode · Autoabode

How Encrypted Communication Works Without Internet: A Technical Guide to Off-Grid Secure Messaging

The modern intuition for encryption is HTTPS — a secure tunnel between your device and a server somewhere on the public internet, mediated by a certificate authority chain that ultimately roots in a handful of globally trusted issuers. That model collapses entirely when there is no internet. No HTTPS, no TLS handshake, no certificate revocation list, no cloud key vault. Yet the requirement for confidential, authenticated, tamper-evident messaging does not disappear when the network goes — it intensifies. Soldiers operating along the Line of Actual Control, search and rescue teams in a flooded valley, mountaineers above the snow line, and border patrols deep in the Sundarbans all need cryptographic guarantees while operating across kilometres of terrain that has never seen a cell tower. This guide walks through how encrypted communication works without internet — the cryptography, the key management, the radio physical layer, and the practical engineering trade-offs that make off-grid secure messaging actually deliverable. At Autoabode we build MeshVani, an indigenously designed AES-256-GCM encrypted LoRa mesh communicator, and the longer-range MeshVani Relay node, both engineered around the assumption that the public network will not be there when our users need it most.

Why Internet-Style Encryption Doesn't Translate Off-Grid

The PKI assumption breaks first

Internet TLS depends on a public key infrastructure: a small set of trusted root certificate authorities issue intermediate certificates, which in turn issue the leaf certificate that secures your connection. The browser ships with the trust roots; revocation is checked against an online responder; cipher suites are negotiated through a multi-round handshake. Every one of these steps assumes a reachable, low-latency, high-bandwidth packet network. Off-grid operations have none of those guarantees. A LoRa link runs at 0.3 to 50 kilobits per second; a multi-hop mesh adds 200 to 800 milliseconds of latency per hop; an INSAT or Iridium link costs significant power and throughput; and any external trust anchor you depend on becomes a single point of failure the adversary can exploit. The off-grid encryption stack must therefore be entirely self-contained and assume that no external server, no time service, no revocation responder, and no certificate issuer is reachable when the user actually needs to talk.

Bandwidth and packet size constraints

The second hard constraint is throughput. A typical LoRa frame carries 51 to 222 bytes of payload depending on spreading factor and modulation. By the time you account for routing headers, sequence numbers, and authentication tags, the application has perhaps 100 to 180 bytes per packet to spend. A standard TLS ClientHello alone is over 500 bytes, and an X.509 certificate chain runs into kilobytes. Internet cryptography was never designed to fit through this kind of pipe. Off-grid encryption is built around small symmetric primitives — AES, ChaCha20, BLAKE2 — that produce minimal overhead per packet, and around session establishment that completes in one or two short exchanges rather than the multi-round handshakes of TLS.

The Off-Grid Encryption Stack — Layer by Layer

Layer 1: The radio physical layer

Encryption is meaningless if the adversary can simply jam or direction-find the carrier. The first layer of an off-grid secure link is therefore the radio physical layer itself. LoRa's chirp spread spectrum (CSS) modulation occupies a wide bandwidth and is decodable below the noise floor, which makes detection and direction-finding harder than for conventional narrow-band FSK. Frequency hopping spread spectrum (FHSS) goes further: the carrier moves across a sequence of channels under cryptographic control, so an eavesdropper without the hop sequence sees only a sparse pattern of brief bursts that are individually short enough to defeat most direction-finding equipment. The MeshVani Relay node, used to extend mesh range up to 20 kilometres point-to-point, runs FHSS over the 865-867 MHz Indian ISM band approved by the WPC, with a hop sequence derived from the same pre-shared key material that drives the application-layer encryption. Physical-layer covertness and application-layer secrecy are designed together, not bolted on after the fact.

Layer 2: Authenticated symmetric encryption (AEAD)

The workhorse cryptographic primitive in off-grid encrypted communication is authenticated encryption with associated data (AEAD). AES-256-GCM and ChaCha20-Poly1305 are the two universally accepted choices. Both take a 256-bit key and a unique nonce per packet, encrypt the plaintext payload, and produce a 16-byte authentication tag that detects any tampering. AES-256-GCM is the default in MeshVani because hardware AES acceleration is available on every modern microcontroller, including the STM32 and ESP32 families used in the radio's main processor, which keeps power consumption well under 30 milliwatts during continuous secure transmission. The nonce is a 12-byte value built from a 4-byte session identifier and an 8-byte monotonic counter, guaranteed not to repeat for any given key. The 16-byte authentication tag means that a single bit-flip anywhere in the ciphertext, including in the nonce or associated data, causes the receiver to reject the packet entirely — there is no partial decryption, no fail-open mode, no soft failure.

Layer 3: Key management without a server

The hardest engineering problem in off-grid encryption is key distribution. Without a server, without an internet, and often without a face-to-face meeting before deployment, how do two radios establish that they are talking to a legitimate peer? The answer is a layered key hierarchy. A master fleet key, generated and loaded at the time of unit issue, identifies the operating organisation — a battalion, a rescue team, a border outpost. Beneath it, group keys identify specific tactical sub-units, and beneath those, ephemeral session keys are derived per conversation using HKDF (HMAC-based key derivation function) seeded with a fresh nonce. The master key is loaded over a wired serial interface in a controlled environment — typically inside a SCIF or a secure room at the issuing depot — and is stored in a tamper-resistant secure element on the radio. Loss of a single radio is contained to that radio's ephemeral keys; a wider compromise requires physical capture of the secure element, and in that case the fleet key can be revoked at the next mass re-key event. The architecture deliberately does not depend on any external trust anchor.

Layer 4: Forward secrecy and post-compromise recovery

A well-designed off-grid stack delivers forward secrecy: even if a fleet key is later compromised, traffic recorded earlier cannot be decrypted retroactively. This is achieved by deriving each session key from the fleet key combined with fresh randomness contributed by both peers at the start of every conversation, and by aggressively destroying old session keys after a short rotation interval. The trade-off is that re-keying consumes airtime and adds latency at the start of each session, so the rotation interval is tuned per deployment — a high-tempo tactical link rotates every 60 to 120 seconds, while a low-traffic disaster relief link can rotate every 15 minutes without operational impact. Post-compromise recovery — the property that a hijacked node can be excluded from the mesh — is achieved through a periodic group re-key broadcast that excludes the revoked node's identity from the new key schedule.

On Autoabode's MeshVani platform, AES-256-GCM authenticated encryption operates at the link layer, with HKDF-derived per-session keys rotated on a tactical timer, all running on a tamper-resistant secure element with hardware AES acceleration. End-to-end power draw of the encryption pipeline is under 30 milliwatts, and a complete session re-key completes in under 800 milliseconds across a multi-hop mesh.

Threat Models — What Off-Grid Encryption Is Designed to Defeat

  • Passive eavesdropping by an adversary with a sensitive software-defined receiver
  • Active replay of a previously captured packet to confuse a peer or exhaust a queue
  • Selective jamming of specific channels to force fallback to insecure modes
  • Direction-finding to triangulate and locate a transmitting node
  • Physical capture of a single radio and extraction of its key material
  • Traffic analysis without payload decryption (timing, length, hop count)
  • Man-in-the-middle injection of a rogue node into the mesh

AES-256-GCM defeats passive eavesdropping cleanly: a 2^256 key space is computationally unreachable. Replay is defeated by the per-packet monotonic nonce and a sliding-window receiver state. Selective jamming is mitigated by FHSS at the physical layer combined with a strict policy that the radio refuses to fall back to insecure modes if encrypted carriers are unavailable — silence is preferred to an insecure transmission. Direction-finding is hardest in dense terrain and against patient adversaries; the practical mitigation is short transmission bursts, low duty cycle, and procedural discipline rather than a cryptographic primitive. Capture-and-extract attacks are why the secure element matters: keys never leave the chip in plaintext, and the chip's tamper response zeroises material on physical intrusion. Traffic analysis is not fully solvable, but is partially mitigated by padding all packets to a constant length and by maintaining a low-rate cover-traffic stream during quiet periods.

MeshVani in the Field — A Practical Implementation

The MeshVani communicator carries a Microchip ATECC608B secure element holding both the fleet master key and the device-unique identity key, with hardware AES-256 acceleration on the ESP32-S3 main processor. Voice payloads are encoded at 1.6 kilobits per second using a Codec2 vocoder, fragmented into 96-byte AEAD-encrypted frames, and forwarded across the mesh using a destination-sequenced distance-vector routing protocol that hides routing identity inside the encrypted payload itself. A typical voice clip of three to five seconds traverses two to three hops and arrives with sub-second latency end-to-end, fully authenticated. Text and short-burst data — coordinates, casualty reports, sensor readings — share the same security stack. The user-facing experience is a push-to-talk button, a small OLED screen, and an LED indicator for mesh health; everything else, including the entire cryptographic state machine, is handled silently in firmware. The complete operational guide and field deployment blueprint is available through our counter-drone and tactical comms product line and the broader LoRa mesh networking for disaster relief in India reference.

Range, Latency, and Power Realities

A handheld MeshVani node achieves a line-of-sight range of 4 to 8 kilometres at SF12 (the most sensitive spreading factor) running at 250 milliwatts, which is the maximum permitted in the Indian 865-867 MHz ISM band. A MeshVani Relay node, mounted on a vehicle or a tripod, extends point-to-point range to 20 kilometres with the same modulation. Multi-hop meshes routinely cover 40 to 100 square kilometres of mountainous terrain with five to seven nodes deployed. Latency is dominated by the radio's symbol time and the routing layer: a single-hop secure voice clip arrives in 350 to 500 milliseconds, three hops add another second. Battery life under realistic disaster duty cycle (roughly 10 percent transmit, 90 percent receive) exceeds 36 hours on a single charge. None of these numbers depend on any external network; the entire system is self-contained.

  • Handheld range (SF12, 250 mW): 4–8 km line-of-sight
  • MeshVani Relay range (FHSS, point-to-point): up to 20 km
  • Mesh coverage with 5–7 nodes in mountainous terrain: 40–100 km²
  • Single-hop encrypted voice latency: 350–500 ms
  • Encryption power draw (continuous transmit): under 30 mW
  • Session re-key time across multi-hop mesh: under 800 ms
  • Battery life (10% TX duty cycle): 36+ hours per charge

Frequently Asked Questions

Q: Is off-grid AES-256-GCM as strong as TLS for internet messaging?

A: For confidentiality and message integrity, yes. Both ultimately rely on the same authenticated symmetric primitive (AES-GCM or ChaCha20-Poly1305) and the same 256-bit key strength. The differences lie in identity and revocation. TLS proves that you are talking to a specific named server through a chain of certificate authorities. Off-grid encryption proves that you are talking to a peer that holds the same fleet key — a different identity model better suited to closed-group, mission-scoped deployments. For the use cases off-grid radios serve — military, disaster response, expedition, border patrol — that closed-group model is the correct one.

Q: What happens if a radio is captured by an adversary?

A: The captured radio's session keys can decrypt only its currently active session, which has a short rotation interval. Forward secrecy ensures that previously recorded traffic cannot be decrypted retroactively. The fleet master key is held in a tamper-resistant secure element and is zeroised on physical intrusion. At the next opportunity, command can issue a group re-key broadcast that excludes the compromised device's identity from the new key schedule, after which the captured radio cannot rejoin the mesh. The combination of secure element, forward secrecy, and group re-key gives operational discipline a recovery path even when a node is lost in the field.

Q: Can off-grid encrypted radios be used legally in India?

A: Yes. The 865-867 MHz ISM band is licence-exempt under the Indian WPC's General Radio Frequency Allocation Plan up to 1 watt EIRP, and AES-256 encryption falls within the permissible cryptographic strength for civilian and government use under the IT Act 2000 framework. For procurement by central paramilitary forces, the Indian Army, NDRF, and SDRF, MeshVani is supplied through the GeM portal under standard tender provisions, with full DGAQA-compatible documentation available on request through our reach our team page.

Q: How does MeshVani compare with Iridium or INSAT for tactical comms?

A: They are complementary, not alternatives. Satellite phones provide global, low-bandwidth voice between handsets and a single peer, with airtime costs measured per minute and dependence on a foreign-controlled constellation in the Iridium case. MeshVani provides peer-to-peer encrypted voice and text within a 40 to 100 square kilometre operational area at zero airtime cost, no foreign dependency, and full local key control. A typical disaster relief deployment uses one or two satellite handsets at incident command and a fleet of MeshVani nodes for distributed team coordination — the right architecture for the first 72 hours after a network-isolating event.

Q: Do I need an internet connection to provision new MeshVani radios into an existing mesh?

A: No. New radios are keyed at the issuing depot or in the field using a wired serial provisioning cable from an authorised loader device. The loader device itself can operate fully offline. Once provisioned, a new node joins the mesh by exchanging a short authenticated discovery handshake using the fleet key, after which it participates in normal session re-keying. The entire lifecycle — issue, deploy, re-key, decommission — can be operated end-to-end without any internet connectivity, which matches the operational reality of forward operating bases and remote rescue staging areas.

Encrypted communication without internet is not a compromise on security — it is a different design problem with a different set of trade-offs, and one that maps cleanly onto the operational realities of Indian defence, paramilitary, disaster response, and high-altitude expedition use. The cryptographic primitives are mature, the radio physical layer is well understood, and the engineering challenge is in matching them to the constraints of bandwidth, power, range, and key management without a server. At Autoabode our MeshVani communicator and MeshVani Relay node bring this stack into a production-grade Indian-manufactured platform that has been fielded with NDRF teams, paramilitary battalions, and high-altitude rescue groups over the past two years. To evaluate MeshVani for a specific deployment scenario or to arrange a hands-on demo with our applications team, book a demo or reach our team and we will respond within one working day.

how encrypted communication works without internetoff-grid secure messaging IndiaAES-256-GCM authenticated encryptionMeshVani LoRa encrypted communicatorMeshVani Relay frequency hoppingtactical radio without cellularpre-shared key cryptography off-gridforward secrecy in tactical radios

Rohan Sharma

Head of Avionics, Autoabode · Autoabode Consumer Electronics Pvt. Ltd.

Expert author at Autoabode — writing at the intersection of industrial 3D printing, defence manufacturing, and advanced UAV systems. Based in New Delhi, India.