You are safe with ICTK

We Protect Your Values!

2020 PUF meets QuantumLG U+'s 'quantum security chip' exclusively for IoT terminals is developed to enhance security

(서울=연합뉴스) 계승현 기자 = LG유플러스[032640]는 사물인터넷(IoT) 단말용 양자 보안칩 개발에 성공해 보안 성능을 끌어올렸다고 27일 밝혔다.

회사는 이를 위해 보안 시스템온칩(SoC) 개발 기업 '아이씨티케이 홀딩스'(ICTK holdings), 정보 보안 스타트업 '이와이엘'(EYL), LG CNS와 손잡았다.

양자 보안이란 '양자 난수 생성기'(QRNG)를 사용해 예측이 불가능하고 패턴이 없는 순수한 난수를 생성해 암호화 키 중복과 예측을 방지하는 기술이다.

LG유플러스, IoT 단말용 양자보안칩 개발

[LG유플러스 제공. 재판매 및 DB 금지]

기존 IoT 기기에 사용하던 보안 기술인 '순수 난수 생성기'(TRNG) 대비 암호의 무작위성이 높아 해킹 위협으로부터 더욱 안전하다. 3사는 이런 QRNG를 '보안 칩'(PUF)에 합쳐 '양자보안칩'(QPUF)으로 구성했다. QRNG와 PUF가 하나의 칩 안에서 데이터를 직접 주고받는 방식이다. 각각의 칩으로 구성돼 외부에서 신호를 주고받던 과거와 달리 정보 탈취의 가능성이 거의 사라졌다.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.