You are safe with ICTK

We Protect Your Values!

2023 1st steps towards IPOICTK Holdings Introduces qTrustNet VPN at RMCS 2023 Exhibition in the US

ICTK Holdings Introduces qTrustNet VPN at RMCS 2023 Exhibition in the US

Post-Quantum Cryptography(PQC) based virtual private network (VPN) server... Various security and solutions based on PUF also revealed

[Boan News] ICTK Holdings (CEO Justin J. Lee) announced that it participated in the Rocky Mountain Cyberspace Symposium (RMCS) 2023 exhibition held at the Broadmoor Hotel in Colorado, USA, for four days from the 20th.

ICTK Holdings CTO Kang Bong-ho (second from right) explains 'qTrustNet VPN' equipment at ICTK's exclusive booth at RMCS 2023 [Photo: ICTK Holdings].

Hosted annually by Armed Forces Communications And Electronics Association(AFCEA), RMCS is the largest event in the US for defence industry security. This year, a total of 158 US companies participated, including IBM, Palo Alto Networks, Verizon, BlackBerry, Dell, and HP.

ICTK Holdings was the only company outside of the U.S. to participate in the exhibition with a booth and showcased its 'qTrustNet VPN' equipment, a virtual private network (VPN) server based on Post-Quantum Cryptography(PQC). ICTK also unveiled various security chips, security modules, and solutions based on its proprietary Physically Unclonable Functions(PUF) such as G3-G5.

At the event, ICTK held export consultations on security strategic goods with key officials from the US Air Force (USAF) Cyber Test Brigade and the US Forces Japan (USFJ) in charge of security-related assets in the US military. In particular, in-depth consultations were held with local military security companies such as VMware, IBM, Ubico, and Booz Allen Hamilton. Local officials focused their attention on ICTK, which was the first company in the world to mass-produce PUFs derived from US defence science and technology on a single chip.

"With this exclusive participation in the US local security exhibition, we will begin to target the US public and private security markets in earnest," said CEO Lee of ICTK Holdings. "We will continue to participate in the 'e-Government Information Security Solution Fair' (eGISEC) at KINTEX in Ilsan next month and the 'Japan IT Week' in Tokyo, Japan in April to promote the status of PQC and PUF-based 'K-Security' technology around the world."

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.