Application
Quantum Shieldz Application
A security app product family that applies quantum convergence security technology to various objects such as IoT-based H/W devices, S/W apps (financial apps, etc.), NFTs (e-game items, etc.)
Open innovation
Diverse products and solutions
The main goal is to enhance the cybersecurity of various devices and data connected to the network by providing a more secure and suitable platform. We develop and supply various application applications by utilizing our underlying technologies such as QRNG and QCC.
Qlock authentication system: Overcoming the limitations of pattern authentication, quantum security technology convergence, non-face-to-face financial work, and App protection for various IoT devices
TRIGEN file distribution management system: Through OTP authentication with QRNG technology, only authorized users can access files stored in TRIGEN, a new concept storage device that is monitored in real time
QLock
Behavior-based pattern authentication convergence security solution with quantum security technology applied
Quantum random numbers can be applied to security hardware as well as various software applications. Qlock Application was developed to solve the security vulnerabilities of Pattern Lock and can be applied to various authentication systems.
Existing Pattern Lock has a very serious vulnerability through shoulder surfing attack , etc. QLock is a new quantum fusion security technology that has improved these security issues.
-
A new authentication technology that improves security by using quantum random numbers and touch sensing technology in the existing vulnerable pattern authentication
Patented technology blocking when unauthorized person attempts the same pattern authentication
-
QRNG
Symmetric key encryption
ECDSA quantum private key
Quantum public key encryption
Quantum random number Nonce, SALT (PBKDF2 derivation function), etc.
-
Smudge attack
Thermal attack
Shoulder Surfing attack
Credential stuffing attack, etc. can be defended
-
Can be used for web, app login authentication, payment authentication, identity authentication, screen lock authentication, etc.
-
EYL’s the secure voice device solution applied to Quantum Shieldz Cipher
TRIGEN file distribution management system
64G Byte USB storage device combined with QRNG technology
TriGen is a new-concept 64G Byte USB storage device combined with QRNG technology to supplement the safety of USB storage devices that were convenient but banned due to security issues.
[ TRIGEN operation and configuration ]
-
Quantum OTP which is authenticated and used, installed on a personal PC and delivered to an authorized user's mobile phone
-
Real-name USB storage device implementation to prevent corporate data leakage
-
Centralized security monitoring for all actions (file creation, copying, updating, etc.), file distribution, and information asset distribution process after installed in PC
-
User PC Lock
TriGen Lock
-
Automatic locking in case of authentication error more than 3 times
permission to third party use through mutual authentication, network access right control for each user
remote destruction in case of loss
and real-time IP tracking
-
PC are provided to overseas business travelers, but only necessary files are copied to TriGen before business trips and used to prevent leakage of company data. Central monitoring system monitor how it is being used on a business trip.
When large-sized floor plan needs to be delivered to secondary or tertiary vendors, third-party function monitor who is using the file and how it is being used.
Record the distribution process of files by paying them to departments in charge of important and confidential files such as research institutes and finance departments.
IoTyzer
Web-implemented security verification framework
It can be used with QCM or separately. It performs a randomness test for key generation, a cryptographic algorithm security test, and a side-channel attack test, and provides the result as an automatic report.
-
• Using probabilistic and statistical tests for entropy sources from NIST SP 800-90B and BSI's AIS 31.
• Check the quality of the random number sequence generated by the random number generator and evaluate its suitability in cryptographic work
-
• Provides an easy way of verifing encryption algorithms deployed in IoT devices and operated in various service environments are correctly implemented according to specifications
• You can use this system even during development
-
• The EYL IoTyzer Side Channel Attack (SCA) test provides an online platform for evaluating common side-channel leaks in cryptographic module implementations.
• The test set includes :
o CRI Test Vector Leakage Assessment (TVLA)
o Mutual Information test
o Kullback-Leibler (KL) divergence test
QCM
Development Kit for Crypto Developers
QCM (Quantum Crypto Module) is connected with applications such as technology kernel for product shell developers, Iotyzer, etc. during QCC development.
-
• SCA (Side Channel Attack) analysis
• Hardware chip encryption design and testing
-
• IoT device or chip developer
• Side channel defense technology researcher
-
• Able to test with security verification framework “IoTyzer”
• Mixed design of FPGA and MCU for implementing various functions is possible
• Capable of complex design or testing of firmware and RTL code
E2E Encryption Solution
• A device that implements KCMVP encrypted communication by simply connecting to products that transmit and receive images or data, such as CCTV and drones, without making any special changes.
• Provides sectional encryption by encrypting Ethernet packets on a specific IP and port.
• Paired devices use quantum random number and elliptic curve-based key generation/key agreement algorithms to generate and encrypt a new session key generated for each session.
• Pre-entered authentication keys are securely stored in the Hardware Security Module (HSM) within the Quantum Shieldz® NanoversTM NC11 chip.
• Designed to output only the session key for encryption generated through authentication and key agreement with the paired device to the cryptographic operation.
-
CPU
• Broadcom BCM2711, Quadcore Cortex-A72 64 bit 1.5GHz
Memory
• 4GB LPDDR4
Interface
• 2 Gigabit Internet
OS
• Debian
Storage medium
• 8G eMMC for operating system and data storage loading
Environments
• Operating temperature -20℃ to 70
Power supply
• 5V / 3A DC supply
Cryptographic Module
• EYL Cryptolib 1.0 KCMVP Verified Crypto module.
Key Storage
• Quantum Shieldz® Nanovers NC11
-
Block Cipher Algorithms
• LEA 128/192/256
Operation Mode
• CTR
Key agreement algorithm
• ECDH(Elliptic Curve Diffie-Hellman)
Elliptic Curve
• NIST P-256(secp256r1)
Hash function
• SHA-256
Message authentication codes
• HMAC(Keyed-Hash Message Authentication Code)
Encryption speed
• 70 Mbps, 4 Full HD videos simultaneously or 4K video processing
Protocol
• Ethernet UDP
Communication method
• 1:1 peer to peer communication, 1:N communication
-
Processor
• ARM 32-bit Cortex-M4 CPU with FPU
• JTAG and SWD Debugger
Cryptographic Hardware Accelerator
• AES 128, 192, 256
• SHA-256
Random Number Generator
• EYL’s unique Quantum Random Number Generator with QEC
Embedded Memory
• 1MB of Flash memory for user Program
• Flash Accelerator : 4-Way 8KB
• 8 KBytes Internal SRAM for Instruction
• 256 KBytes Internal SRAM for Data
Boot Modes
• Serial Flash Booting / Debugger Booting
External Memory Interface
• SRAM Memory I/F
• 4Mbytes Address
• 32bit Data width
USB 1.1 Full-Speed Device Compatible
• Supports Full-speed Data Rate 12Mbps