Secure communication requires reliable and unbiased random numbers
All random is not created equal. Pseudo Random Numbers are not truly unpredictable, and have been associated with multiple vulnerabilities and breaches.
Most security applications today use Pseudo-Random Numbers to generate keys. These Pseudo-Random Numbers are generated from a short random seed using deterministic algorithms. Although widely used in modern digital electronic information systems, Pseudo-Random Numbers have resulted in many security issues.
A True Random Number Generator (TRNG) uses random physical processes to generate numbers instead of computational algorithms. However not all True Random Numbers are created equal!
“True” Random Numbers based on classical deterministic systems can be predicted if enough is known about the system, or if they can be influenced by actions such as temperature changes.
True Random Numbers generated using quantum physics, also known as quantum random number generators (QRNG), can be truly random. Many quantum random number generators are based on the detection of single photons and have relatively limited throughput. This makes it challenging and expensive to implement them, and may result in operational constraints regarding key rotation or number of keys for example.
QuintessenceLabs delivers fast, commercial rate True
Random Numbers at 1Gb/sec
QuintessenceLabs’ high throughput True Random Numbers solve the issues associated with pseudo-random numbers cost-effectively, and serve as a building block for many security applications.
Our True Random Numbers are derived from a second generation Quantum Entropy Source. The system is designed to take measurements at a high rate so as to yield a conditioned, full-entropy random bit generation rate of up to 1Gb/s.
The qStream Quantum Random Number Generator is delivered as a standalone appliance or as part of our Trusted Security Foundation (TSF). It is also a component of our integrated qProtect solution as well as of our quantum key distribution technology, qOptica. Please refer to our product pages for more details.
Today’s cryptographic systems rely on complex and robust mathematical algorithms to ensure data confidentiality, but can be very difficult to implement, as well vulnerable to attacks. Cyber attacks on keys and other parameters that are used to secure data are becoming more sophisticated, as are the tools and technologies used by the attackers.
Secure Keys and Other Cryptographic Objects
Approved cryptographic algorithms can in theory offer high levels of security, but can be vulnerable because of weak random numbers.
Attackers often focus not on the algorithm itself, but on other parameters used to implement the encryption, such as encryption keys or authentication parameters. These can make the overall encryption vulnerable when they are based on weak pseudo-random numbers.
Key management is one of the most complex problems for encryption.
Many available solutions are not fully interoperable, do not generate high quality keys or do not deliver adequate life cycle or policy control, resulting in weak, partial or siloed encryption that attackers will exploit.
Quintessence Labs qCrypt is our advanced key and policy manager developed to address the challenges faced in implementing effective enterprise key management strategies.
It is a vendor neutral, centralized appliance, fully conformant with published Key Management Interoperability Protocol (KMIP) standards. It delivers fine-grained policy control and full logging, with the option of incorporating the high speed true random number generator for the generation of the highest quality random objects.
How long will today’s conventional cryptography be secure?
We don’t know, however some very real threats are emerging. These threats include ever increasing processing power, improved mathematical methods and the rapid development of quantum computers. Information encrypted and sent today can easily be stored and decoded later as these threats develop, making classic cryptography a convenient solution for the time-being, but not a future-proof one.
QuintessenceLabs has the ability to strengthen encryption implementations today, seamlessly incorporating the qStream true random number generator and qCrypt KMIP compliant key and policy manager to provide an integrated enterprise key and policy management solution
But we aren’t stopping there. QuintessenceLabs is currently working on our second-generation quantum key distribution (QKD) technology qOptica.
qOptica all but eliminates the risks involved with key distribution because any attempt to intercept the key in transmission leaves a trace detectable by both sender and receiver. qOptica will distribute the strongest keys in a secure and cost-effective manner. Currently at the Advanced Technology Demonstrator stage.
QuintessenceLabs is at the forefront of developing a commercially available quantum key distribution (QKD) solution. QKD uses quantum physics to provide a key exchange solution that is absolutely secure and future proof.
qOptica, our second generation Quantum Key Distribution technology (also known as Quantum Cryptography), is a perfectly secure means of distributing keys.
qOptica all but eliminates the risks involved with key distribution because any attempt to intercept the key in transmission leaves a trace detectable by both sender and receiver so they can take mitigating action. qOptica will allow you to share the strongest possible keys in a secure and cost-effective manner.
First Generation Quantum Key Distribution
Based on “single photon” technology. While a revolution in security this approach requires complex and expensive photo-emitting and photon-detection components to generate and detect single photons of light, and can result in low throughput rates
Second Generation Quantum Key Distribution
QuintessenceLabs’ breakthrough is to use a continuous variable bright laser beam for key distribution, while leveraging commercial off-the-shelf (COTS) telecommunications components and existing fiber optic cables to offer a very cost competitive solution. Our technology encodes a truly random secret key directly onto a continuous beam of laser light, emitting billions of photons per second and achieving very high data throughput rates. Currently at the Advanced Technology Demonstrator stage.