You are safe with ICTK
History



We Protect Your Values!

2021 ICTK for Quantum SecurityQuantum cryptography technology to prevent attacks from quantum computers

LG Uplus announced on January 19 that it has developed a "Q-PUF USB", a USB-type security token, containing Post Quantum Cryptography (PQC) technology to prevent attacks from quantum computers. / Courtesy of LG Uplus 출처 : Korea IT Times(http://www.koreaittimes.com)


LG Uplus announced on January 19 that it has developed a "Q-PUF USB", a USB-type security token, containing Post Quantum Cryptography (PQC) technology to prevent attacks from quantum computers and applied it to its digital New Deal business.

"Q-PUF USB" is a USB security token created by combining ICTK Holdings' hardware security technologies, Physically Unclonable Function (PUF) and Quantum Random Number Generator (QRNG).

In the era of quantum computing, authentication technology that recognizes what to perform encryption communication and verifies that data is not manipulated becomes important.

LG Uplus has developed "Q-PUF USB" by upgrading quantum-resistant algorithms that will solve security threats when authenticating.

Quantum-resistant encryption is an encryption method that uses complex mathematical algorithms that take billions of years to solve using quantum computers. RSA encryption method can be easily solved by quantum computers, so next-generation security technologies such as quantum-resistant encryption are needed.

It can be applied to key elements of security such as cryptographic key exchange, data encryption, and integrity authentication, and can be implemented only with software without any separate equipment.

This allows flexible application from mobile phones to small IoT devices to provide security in all areas of wired and wireless networks.


To read more:

http://www.koreaittimes.com/news/articleView.html?idxno=103177








Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >



We do these things.
PUF Technology



What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.

Resource
  Product

Resource

Product

Investment

News