You are safe with ICTK

We Protect Your Values!

2021 ICTK for Quantum SecurityQuantum-resistant cryptography technology applied to medical information system

[Courtesy of LG Uplus]

SEOUL -- Quantum-resistant cryptography technology has been applied to a medical information system at a general hospital to strengthen security in a project led by LG Uplus, a mobile carrier in South Korea.

LG Uplus (LGU+) has commercialized post-quantum cryptography (PQC) technology, which refers to cryptographic algorithms that are thought to be secure against an attack by a quantum computer. Cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat.

LGU+ said on February 1 that it has teamed up with ICTK Holdings, a transaction and security solution provider, to develop an application that utilizes quantum-resistant cryptography for data transmission and reading of a medical information system Eulji Medical Center. The application proved that quantum-resistant cryptography can be used to protect crucial information in medical fields.

Medical personnel can gain access through the process of authenticating servers and public keys with certificates stored on security chips by connecting USB-type security tokens to personal computers and entering IDs and passwords. "We will establish strong security that is valid in the era of quantum computing in all areas where data is delivered to customers as well as telecommunication networks," said Koo Sung-chul, in charge of LGU+'s wired network business.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.