QNu Labs

Categories
news

qosmos-available-in-aws-marketplace

QNu’s Qosmos - Quantum Key Generation as a Service Now Available in AWS Marketplace

QNu's Quantum Keys as a service now available in AWS Marketplace

QNu’s Qosmos - Quantum Key Generation as a Service Now Available in AWS Marketplace

QNu Labs proudly announces the general availability of its QOSMOS (Entropy-as-a-Service) solution in the AWS Marketplace.

This curated service has the best source of true randomness which is derived from unpredictable physical phenomena of quantum effects. It helps organizations, developers, and security teams to fetch quantum-sourced random numbers for any application usage like cryptographic key generation, tokenization, authentication, and identity management.

Qosmos's presence on AWS Marketplace will ease the procurement process to handle the exponentially increasing demand for the solution, serving enterprises/government to fast-growing medium-sized companies and small innovative businesses across every industry vertical. A user can select the Qosmos service subscription, the preferred contract type (Gold, Silver, Bronze), followed by payment made through the AWS Marketplace. The user will then be redirected to a QOSMOS registration page. After purchasing the subscription, a welcome email will be sent to the user and an intimation email will be sent to the QOSMOS team to initiate the onboarding process and to share relevant documentation with the user.

A new Forrester Total Economic Impact™ study found that by using AWS Marketplace, organizations experience three key benefits:

To learn more about QNu’s Qosmos and to purchase in AWS Marketplace, please visit: https://aws.amazon.com/marketplace/pp/prodview-fzkuj32ktapmq?sr=0-1&ref_=beagle&applicationId=AWSMPContessa

QNu's Quantum Keys as a service now available in AWS Marketplace

QNu Labs proudly announces the general availability of its QOSMOS (Entropy-as-a-Service) solution in the AWS Marketplace.

This curated service has the best source of true randomness which is derived from unpredictable physical phenomena of quantum effects. It helps organizations, developers, and security teams to fetch quantum-sourced random numbers for any application usage like cryptographic key generation, tokenization, authentication, and identity management.

Qosmos's presence on AWS Marketplace will ease the procurement process to handle the exponentially increasing demand for the solution, serving enterprises/government to fast-growing medium-sized companies and small innovative businesses across every industry vertical. A user can select the Qosmos service subscription, the preferred contract type (Gold, Silver, Bronze), followed by payment made through the AWS Marketplace. The user will then be redirected to a QOSMOS registration page. After purchasing the subscription, a welcome email will be sent to the user and an intimation email will be sent to the QOSMOS team to initiate the onboarding process and to share relevant documentation with the user.

A new Forrester Total Economic Impact™ study found that by using AWS Marketplace, organizations experience three key benefits:

To learn more about QNu’s Qosmos and to purchase in AWS Marketplace, please visit: https://aws.amazon.com/marketplace/pp/prodview-fzkuj32ktapmq?sr=0-1&ref_=beagle&applicationId=AWSMPContessa

Follow Us

Categories
whitepaper

Bringing Quantum Security to Blockchain powered Data-Interchange

WHITEPAPER

Bringing Quantum Security to Blockchain powered Data-Interchange

Cyber risk to data safe-keeping is now exponentially increasing with the access to Quantum
computing not too far away in the future.

Bringing Quantum Security to Blockchain powered Data-Interchange

Across the world, businesses and individuals are either digitally enabled or getting enabled at a fast pace. With petabytes of data being generated at break-neck speed, Data TRUST and SECURITY are the holy grail of the digital world. Cyber risk to data safe-keeping is now exponentially increasing with the access to Quantum computing not too far away in the future.

Addressing this issue NOW for the future is the partnership between ThynkBlynk and Qnu Labs. Two cutting edge, innovative technology platform players, we have come together to deliver a market ready and viable Quantum secure Data-Interchange powered by Blockchain

In this whitepaper, you'll discover:

Bringing Quantum Security to Blockchain powered Data-Interchange

Across the world, businesses and individuals are either digitally enabled or getting enabled at a fast pace. With petabytes of data being generated at break-neck speed, Data TRUST and SECURITY are the holy grail of the digital world. Cyber risk to data safe-keeping is now exponentially increasing with the access to Quantum computing not too far away in the future.

Addressing this issue NOW for the future is the partnership between ThynkBlynk and Qnu Labs. Two cutting edge, innovative technology platform players, we have come together to deliver a market ready and viable Quantum secure Data-Interchange powered by Blockchain

In this whitepaper, you'll discover:

Bringing Quantum Security to Blockchain powered Data-Interchange

By filling out this form and clicking submit you acknowledge our terms and conditions.

Categories
whitepaper

Data Security in 4G Drones

WHITEPAPER

Data Security in 4G Drones

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”
– Stephane Nappo

Data Security in 4G Drones

Drone technology is difficult to begin with. It requires a deep understanding of aerial dynamics, mechanics, manufacturing processes and electronics just to start off. Now, if you want to reinforce the system with better automation capabilities, you need to have a great command over the communication protocols and software that is running on these systems. Congratulations, you now have the basic capabilities to compete with the thousands of drone companies around the globe.

But how do you stand out? Drone systems, though mechanically dynamic, are isolated in terms of their data transmission capabilities. Real-time data transmission happens only between the ground unit and the drone itself. UrbanMatrix Technologies (UMT) has been working hard over the past years to solve the realtime data communication problems that make drone operations seamless and the technology a painless venture for industries to adopt in their workflows.

In this whitepaper, you'll discover:

Data Security in 4G Drones

Drone technology is difficult to begin with. It requires a deep understanding of aerial dynamics, mechanics, manufacturing processes and electronics just to start off. Now, if you want to reinforce the system with better automation capabilities, you need to have a great command over the communication protocols and software that is running on these systems. Congratulations, you now have the basic capabilities to compete with the thousands of drone companies around the globe.

But how do you stand out? Drone systems, though mechanically dynamic, are isolated in terms of their data transmission capabilities. Real-time data transmission happens only between the ground unit and the drone itself. UrbanMatrix Technologies (UMT) has been working hard over the past years to solve the realtime data communication problems that make drone operations seamless and the technology a painless venture for industries to adopt in their workflows.

In this whitepaper, you'll discover:

Get insights into Data Security in
4G Drones

By filling out this form and clicking submit you acknowledge our terms and conditions.

Categories
Case-study

Case Study-quantum-security-for-5G-in-telecom

Categories
Case-study

Case Study-quantum security for-last-mile-connectivity

Categories
Case-study

Case Study-Quantum Security for Blockchain

Categories
whitepaper

Quantum Random Number Generator for Tokenization Needs

WHITEPAPER

Quantum Random Number Generator for
Tokenization Needs

Tokenization: A Single Point of Failure in Banking & Financial Services Infrastructure

Quantum Random Number Generator for Tokenization Needs

Tokens are random numbers that are used to mask the personally identifiable information (PII), be it Bank Account Details, Credit/Debit card numbers, PAN / AADHAR data, credentials (pins, passwords) and the like by replacing them with randomly generate substitutes at the time of use; Tokens are thus used for completing the transaction and themselves do not have any intrinsic value except when mapped to the PII that is stored.

Tokenization is different from encryption. In encryption, data is scrambled using the key, whereas, in tokenization, data is replaced with the token for the duration of the specific use. In encryption, the keys are required on either end for encryption and decryption, whereas in tokenization, tokens are used everywhere to complete the transaction instead of actual data, with or without any need for encryption or decryption.

In this whitepaper, you'll discover:

Quantum Random Number Generator for Tokenization Needs

Tokens are random numbers that are used to mask the personally identifiable information (PII), be it Bank Account Details, Credit/Debit card numbers, PAN / AADHAR data, credentials (pins, passwords) and the like by replacing them with randomly generate substitutes at the time of use; Tokens are thus used for completing the transaction and themselves do not have any intrinsic value except when mapped to the PII that is stored.

Tokenization is different from encryption. In encryption, data is scrambled using the key, whereas, in tokenization, data is replaced with the token for the duration of the specific use. In encryption, the keys are required on either end for encryption and decryption, whereas in tokenization, tokens are used everywhere to complete the transaction instead of actual data, with or without any need for encryption or decryption.

In this whitepaper, you'll discover:

Get insights into QRNG for Tokenization
Needs

By filling out this form and clicking submit you acknowledge our terms and conditions.

Categories
whitepaper

kpmg-qnu-labs-report-on-quantum-cryptography-2021

WHITEPAPER

To qubit or not to qubit - is that
the question?

A point of view on the world of quantum cryptography and life in a post quantum world

To qubit or not to qubit - is that the question?

In this report, we focus mainly on why, what, how of quantum cryptography and the applications in today’s digital world. We also throw our expert views on insufficient randomness, weak key generation, insecure data-in-transit, non-availability of cryptoagility for digital transformation and much more.

This report aims to provide a good starting point to understand the problem with respect to key management and the steps organizations must take to start their journey to improve their security paradigm.

In this whitepaper, you'll discover:

- Introduction to Quantum Cryptography and Quantum Computing

- Difference between Classical RNG and QRNG

- Working of Entropy as a Service (EaaS)

- Working of Quantum Key Distribution and Key Management

- Key Challenges in Quantum Cryptography and More

Get insights into To qubit or not to qubit
- is that the question?

By filling out this form and clicking submit you acknowledge our terms and conditions.

Categories
Blog

Quantum Vaccination Program for Enterprises

Quantum Vaccination Program For Enterprises

Quantum Vaccination Program For Enterprises

Worrisome Situation: World Is Facing Not One But Two Pandemics - The Next Global Crisis: “A Cyber Security Pandemic"

Sunil Gupta   |   May 13, 2021

The whole world is reeling from one of the worst pandemics ever seen. Health systems of most countries are under stress, and in a few countries have crumbled from the sheer size of the population infected by a fast-spreading disease. People with low immunity and comorbidities are the worst impacted. The second wave of Covid has taken the world by surprise and the countries which were not prepared for the second, worst surge have been caught off guard and are struggling to contain and manage the disease.

This pandemic will be remembered as a uniquely disruptive period in our lives — but not just as a global health crisis. Online life has digitally transformed, with exponential change at home and work via cyberspace. However, the negative cybersecurity impacts of these online changes have led many experts to summarize the combined events of this year as a growing “cyber pandemic”. As per a govt. report, cyber-attacks amidst this pandemic rose by almost 300% in India. Recently an American cyber intelligence company hinted at a suspected China-linked cyber operation that was focused on India’s electricity grid and other critical infrastructure. The above data highlights that hackers have become more active in the last 12 months, taking advantage of the distraction and confusion all around due to the pandemic. Hackers thrive on such situations to carry out cyber-attacks.

A parallel can be drawn between this health pandemic and the cyber pandemic (CP). CP is widespread across geographies, countries, industry verticals and size of the enterprises. Large defense organizations, cloud service providers, telecom utility providers, critical infrastructures, healthcare enterprises, payment gateways, and financial institutions are suffering from CP. Over 1,000 CXOs were asked about the effects of Covid-19 on enterprise and government organizations in a recent global study done by Tanium and 90 percent of executives surveyed experienced an increase in cyberattacks due to the pandemic.

The recent colonial pipeline ransomware attack and subsequent shutdown has been sending shockwaves through the United States.Unfortunately, majority of the discourse surrounding this cyber incident seems to miss the point: cyberattacks, especially those against our increasingly exposed critical infrastructure, are now part of our digital reality. The U.S. was fortunate that the ransomware intruders did not seek to cause physical destruction by bridging over from the IT systems into the pipeline’s OT systems. Simply put, the colonial pipeline hack could have been far worse than a nuisance to fuel supply chains and impact on consumers wallets.

Hope: “Prevention Is Better Than Cure”

The only viable and effective answer today to save the life of people is mass vaccination. Besides the best practices of improving one’s general health, the only solution available to people is to build sufficient antibodies to fight the disease. This may not protect people from getting infected with Covid-19 and its multiple strains but will ensure that the damage is minimal and restricted, and the recovery is fast. Looking at the havoc created by the pandemic, pharma companies have created vaccines in a record time to deal with the pandemic. Tough times call for desperate measures and heroic efforts.

There was an initial hesitation in people about the efficacy and side effects of the vaccines, some of which are yet to complete trial phases. But people have realized that the risk to life from Covid is far more than the perceived risk from the vaccines. Thus the initial vaccine hesitancy has been overcome and populace is queuing up for inoculation.

CP is different and more difficult to address compared to health pandemic as the attack vectors in CP are far more and take many different forms, ranging from malware and ransomware to man-in-the-middle attacks, compromised credentials, and phishing. Therefore, the solution to address CP has to be easy to embrace, extremely fast in action and should address current and future threats.

QNu Labs, an indigenous quantum security start-up from Bangalore had anticipated a data apocalypse type of situation happening in the near future. It therefore started building next gen data security products in 2016 using bleeding edge technology based on quantum physics. QNu’s quantum-based cryptographic systems use quantum random number generators to produce quantum encryption keys and uses superposition properties of photons to generate identical symmetric keys at both ends of the communication link. Any unauthorized intrusion into the communication immediately severs the quantum channel—it becomes known instantly that there has been an eavesdropping attack.

Solution: Cyber Security Pandemic Needs Quantum Vaccination Drive!!

Given the dire situation of the cyber pandemic, which is only increasing in size, frequency and impact day by day, it is prudent and the need of the hour to implement the products and solutions based on this latest quantum technology. This technology may be new but it has gone through successful trials and implementation worldwide and, like the Covid vaccines, is ready for mass deployment.

It is time for quantum vaccination of enterprises to protect and minimize the impact from various attack vectors. Quvaxin from QNu consists of two solutions. The first solution (Tropos/Qosmos) upgrades the conventional software-based entropy source to quantum ready entropy source for generating encryption keys and digital certificates. The first jab will ensure instantaneously that the keys and digital certificates have no patterns or corelations of any kind which can be exploited by hackers. The second solution (Armos) takes the ‘data security in transit’ to the level of unconditional security so that no man in the middle can ever get an access to encryption keys, even on an unsecure network.

The process of giving Quvaxin is very simple - easy to use APIs, no disruption in the ongoing business and immediate benefits.

Reference Link:

Spread the word

Recommended Reading

What’s lurking in the Cloud?​

The lock down has clearly increased workloads to remote, cloud and hybrid environments. The cyber-attacks have just been growing steadily and relentlessly

Pharma firms at risk of cyberattacks: How companies can become 100% hackproof

In the past few weeks, a few Indian pharmaceutical companies witnessed...

Quantum Internet: A Leap Forward

On Oct. 29, 1969, a set of electrical signals emerged from the University of California, Los Angeles and traveled to one at the Stanford Research Institute in Palo Alto.

Follow Us

Categories
whitepaper

Practical Solution for Secure Network in a Quantum Computing Era

WHITEPAPER

Practical Solution For Secure Network in
a Quantum Computing Era

Encryption algorithms prevalent today should be revisited from the perspective of threat from a quantum computer

Practical Solution For Secure Network In A Quantum Computing Era

Data security in a network is a major concern in quantum era. One of the major challenges faced by quantum technology is to integrate itself seamlessly into present cryptographic infrastructure. The encryption algorithms prevalent today should be revisited from the perspective of threat from a quantum computer. In this paper, we demonstrate a practical demonstration and integration of a Differential Phase Shift Quantum Key Distribution (DPS QKD) protocol with commercial router cum encryptor.

We have validated the randomness of the final secure keys generated from QKD in NIST test suite and it has passed all the 15 tests. The QKD system was integrated with a commercial router cum encryptor and we have successfully performed data transmission from a source router to a destination router.

In this whitepaper, you'll discover:

- QKD Protocols

- Experimental Setup

- Key Generation in QKD Network

- Quantum key Transportation Between End Applications

- Practical Demonstration for Point to Point QKD and More

Get insights into Practical Solution For Secure Network in a Quantum Computing Era

By filling out this form and clicking submit you acknowledge our terms and conditions.