Quantum and Post Quantum

The term quantum is the latest megatrend term. Quantum is interpreted as a quantum, and particles that are smaller than an atom, such as electrons, protons, neutrons, and photons (photons), are collectively called 'quantum'.

Quantum Computing
Quantum Cryptography
Post Quantum Cryptography

Quantum, which is mainly used for the above three, refers to the technology used for computing using the characteristics of computing and quantum, and it is also claimed that the currently commercialized system has 100 trillion times the performance of the strongest supercomputer. 

Quantum supremacy refers to a turning point in which quantum computers achieve greater computational power than the most powerful supercomputers. Many people are concerned that such a Quantum computer could break all existing security schemes. 

The security industry's response to this situation is 'Post Quantum Cryptography'. Cryptographic algorithms are based on the theory that no matter how fast a quantum computer becomes, the complexity of the algorithm increases exponentially, so if a sufficient key length is guaranteed, the encryption system can be maintained. 

Quantum Cryptography is a bit different from this, and it is used for encryption using the characteristics of quantum. 

The main examples are QRNGs that generate random numbers using the characteristics of Photon, and encryption keys using the characteristics of photons. 

QKD (Quantum Key Distribution), etc. 
ICTK Quantum PUF RoT SoC

ICTK's Quantum PUF RoT supports both Quantum Cryptography and Quantum Resistant Cryptography for the era of Quantum Security. 

ICTK possesses the original technology of VIA PUF. SoC implements all RoT encryption chips using VIA PUF in one chip. In this way, you can maintain more secure security