QNu Labs

Categories
whitepaper

Data Security in 4G Drones

Data Security in 4G Drones

Data Security in 4G Drones

Understanding drone technology is not for everyone. A deep understanding of aerial dynamics, mechanics, manufacturing processes, and electronics is required to get started. If the system has to be upgraded to better automation capabilities, mastery over the communication protocols and software that is running on these systems is required.

Though mechanically dynamic, drone systems are isolated in their data transmission capabilities. Real-time data transmission happens only between the ground unit and the drone. UrbanMatrix Technologies (UMT) is working hard over the past years to solve the real-time data communication problems that make drone operations seamless and the technology a painless venture for industries to adopt in their workflows.

The whitepaper explains:

Download Whitepaper

By filling out this form and clicking submit you acknowledge our terms and conditions.
Categories
Case-study

Case Study-quantum-security-for-5G-in-telecom

Get insights into Quantum Security for 5G in Telecom

By filling out this form and clicking submit you acknowledge our terms and conditions.

Categories
Case-study

Case Study-quantum security for-last-mile-connectivity

Get insights into Quantum Security for
Last Mile Connectivity

By filling out this form and clicking submit you acknowledge our terms and conditions.

Categories
Case-study

Case Study-Quantum Security for Blockchain

Get insights into Quantum Security for
Blockchain

By filling out this form and clicking submit you acknowledge our terms and conditions.

Categories
whitepaper

Quantum Random Number Generator for Tokenization Needs

Quantum Random Number Generator for Tokenization Needs

Quantum Random Number Generator for Tokenization Needs

Confidential personal information flows freely on data networks unless it is adequately guarded. Sensitive information can be compromised without digital security. Tokenization is one of the methods to secure personal data.

Tokens are random numbers that are used to mask personally identifiable information (PII) such as bank account details, credit/debit card numbers, PAN/AADHAR data, and credentials (pins, passwords). They are substitutes generated during a transaction. They do not have any intrinsic value except when mapped to the stored PII. They securely complete the transaction.

Tokenization is different from encryption. In encryption, data is scrambled using the key. In tokenization, data is replaced with the token for the duration of use. In encryption, the keys are required on either end for encryption and decryption, whereas in tokenization, tokens are used everywhere to complete the transaction–with or without any need for encryption or decryption.

The whitepaper explains:

Download Whitepaper

By filling out this form and clicking submit you acknowledge our terms and conditions.
Categories
whitepaper

kpmg-qnu-labs-report-on-quantum-cryptography-2021

To qubit or not to qubit - is that the question?

The report is a point of view on the world of quantum cryptography and life in a post-quantum world.

The report focuses on the why, what, and how of quantum cryptography and its applications in today’s digital world. It also highlights expert views on insufficient randomness, weak key generation, insecure data-in-transit, non-availability of crypto-agility for digital transformation, and much more.

The report aims to be a good starting point to understand the problem of key management and the steps organizations should take to start their journey to improve their security paradigm.

The whitepaper explains:

Download Whitepaper

By filling out this form and clicking submit you acknowledge our terms and conditions.
Categories
Blog

Quantum Vaccination Program for Enterprises

Quantum Vaccination Program For Enterprises

Worrisome Situation: World Is Facing Not One But Two Pandemics - The Next Global Crisis: “A Cyber Security Pandemic"

Sunil Gupta   |   May 13, 2021
Quantum Vaccination Program For Enterprises

The whole world is reeling from one of the worst pandemics ever seen. Health systems of most countries are under stress, and in a few countries have crumbled from the sheer size of the population infected by a fast-spreading disease. People with low immunity and comorbidities are the worst impacted. The second wave of Covid has taken the world by surprise and the countries which were not prepared for the second, worst surge have been caught off guard and are struggling to contain and manage the disease.

This pandemic will be remembered as a uniquely disruptive period in our lives — but not just as a global health crisis. Online life has digitally transformed, with exponential change at home and work via cyberspace. However, the negative cybersecurity impacts of these online changes have led many experts to summarize the combined events of this year as a growing “cyber pandemic”. As per a govt. report, cyber-attacks amidst this pandemic rose by almost 300% in India. Recently an American cyber intelligence company hinted at a suspected China-linked cyber operation that was focused on India’s electricity grid and other critical infrastructure. The above data highlights that hackers have become more active in the last 12 months, taking advantage of the distraction and confusion all around due to the pandemic. Hackers thrive on such situations to carry out cyber-attacks.

A parallel can be drawn between this health pandemic and the cyber pandemic (CP). CP is widespread across geographies, countries, industry verticals and size of the enterprises. Large defense organizations, cloud service providers, telecom utility providers, critical infrastructures, healthcare enterprises, payment gateways, and financial institutions are suffering from CP. Over 1,000 CXOs were asked about the effects of Covid-19 on enterprise and government organizations in a recent global study done by Tanium and 90 percent of executives surveyed experienced an increase in cyberattacks due to the pandemic.

The recent colonial pipeline ransomware attack and subsequent shutdown has been sending shockwaves through the United States.Unfortunately, majority of the discourse surrounding this cyber incident seems to miss the point: cyberattacks, especially those against our increasingly exposed critical infrastructure, are now part of our digital reality. The U.S. was fortunate that the ransomware intruders did not seek to cause physical destruction by bridging over from the IT systems into the pipeline’s OT systems. Simply put, the colonial pipeline hack could have been far worse than a nuisance to fuel supply chains and impact on consumers wallets.

Hope: “Prevention Is Better Than Cure”

The only viable and effective answer today to save the life of people is mass vaccination. Besides the best practices of improving one’s general health, the only solution available to people is to build sufficient antibodies to fight the disease. This may not protect people from getting infected with Covid-19 and its multiple strains but will ensure that the damage is minimal and restricted, and the recovery is fast. Looking at the havoc created by the pandemic, pharma companies have created vaccines in a record time to deal with the pandemic. Tough times call for desperate measures and heroic efforts.

There was an initial hesitation in people about the efficacy and side effects of the vaccines, some of which are yet to complete trial phases. But people have realized that the risk to life from Covid is far more than the perceived risk from the vaccines. Thus the initial vaccine hesitancy has been overcome and populace is queuing up for inoculation.

CP is different and more difficult to address compared to health pandemic as the attack vectors in CP are far more and take many different forms, ranging from malware and ransomware to man-in-the-middle attacks, compromised credentials, and phishing. Therefore, the solution to address CP has to be easy to embrace, extremely fast in action and should address current and future threats.

QNu Labs, an indigenous quantum security start-up from Bangalore had anticipated a data apocalypse type of situation happening in the near future. It therefore started building next gen data security products in 2016 using bleeding edge technology based on quantum physics. QNu’s quantum-based cryptographic systems use quantum random number generators to produce quantum encryption keys and uses superposition properties of photons to generate identical symmetric keys at both ends of the communication link. Any unauthorized intrusion into the communication immediately severs the quantum channel—it becomes known instantly that there has been an eavesdropping attack..

Solution: Cyber Security Pandemic Needs Quantum Vaccination Drive!!

Given the dire situation of the cyber pandemic, which is only increasing in size, frequency and impact day by day, it is prudent and the need of the hour to implement the products and solutions based on this latest quantum technology. This technology may be new but it has gone through successful trials and implementation worldwide and, like the Covid vaccines, is ready for mass deployment.

It is time for quantum vaccination of enterprises to protect and minimize the impact from various attack vectors. Quvaxin from QNu consists of two solutions. The first solution (Tropos' QRNG / Qosmos' EaaS) upgrades the conventional software-based entropy source to quantum ready entropy source for generating encryption keys and digital certificates. The first jab will ensure instantaneously that the keys and digital certificates have no patterns or corelations of any kind which can be exploited by hackers. The second solution (Armos) takes the ‘data security in transit’ to the level of unconditional security so that no man in the middle can ever get an access to encryption keys, even on an unsecure network.

The process of giving Quvaxin is very simple - easy to use APIs, no disruption in the ongoing business and immediate benefits.

Related articles

how should security teams prepare for post quantum cryptography?

FEB 14, 2023

How Should Security teams prepare for Post Quantum Cryptography?

Can new optical fibres fast-track Quantum Internet?

FEB 14, 2023

Can new optical fibres fast-track Quantum Internet?

Ingenious Encryption Breach – A Final Call

JAN 23, 2023

Ingenious Encryption Breach – A Final Call

Categories
whitepaper

Practical Solution for Secure Network in a Quantum Computing Era

Practical Solution for Secure Network in a Quantum Computing Era

Practical Solution for Secure Network in a Quantum Computing Era

Cryptography is the art of secret writing. The primary objective of cryptography is to protect the authenticity, integrity, and confidentiality of the information exchanged.

Network data security is a significant concern in the quantum era. The challenge faced by quantum technology is to integrate itself seamlessly into the present cryptographic infrastructure. Today’s encryption algorithms need a revisit in light of quantum computing threats.

In this paper, we practically demonstrate the integration of a Differential Phase Shift Quantum Key Distribution (DPS QKD) protocol with a commercial router cum encryptor.

The randomness of the final secure keys generated from QKD in the NIST test suite is validated, and it has passed all 15 tests. The QKD system was integrated with a commercial router cum encryptor and data was successfully transmitted from a source router to a destination router.

The whitepaper explains:

Download Whitepaper

By filling out this form and clicking submit you acknowledge our terms and conditions.
Categories
Blog

What’s lurking in the Cloud?

What’s Lurking In The Cloud?

Worrisome Situation: World Is Facing Not One But Two Pandemics - The Next Global Crisis: “A Cyber Security Pandemic"

QNu Labs   |   May 12, 2021
What’s lurking in the Cloud?​

The lock down has clearly increased workloads to remote, cloud and hybrid environments. The cyber-attacks have just been growing steadily and relentlessly. New victims every day and by the time the impact is understood there is a new ransomware, a new victim impacting organizations across the world. It looks like the hackers are far ahead in the game.

The four popular brothers -phishing, malware, ransomwares, and DDOS seem to be doing just fine and growing well. While the work has moved to home, by and large organizations have really not checked if the employees work in a safe environment, not physically but from network security, I have not heard of anything other than a VPN and in some cases everything is left to “it is someone else’s problem to solve “.

Let’s take the last few big take downs- Solar Winds, FireEye, Software AG, Paytm, easyJet, Marriot all have been victims, these are companies with skilled people and mature environments. So it’s really not the small business that is being attacked.

The hacker world has its own hall of fame, anything small is not going to get any attention in that world and more audacious the attack better the score. These are coveted spots you earn which keep the methods and game interesting by outdoing each other, new players emerge and join the club. Earlier we had Babuk ransomware which attacked Houston Rockets, a telecom company and Govt dept. all in a single month.

The lights on approach of folks manning the security networks, the talent gap and no updated policies are just adding to the vulnerabilities.

Related articles

how should security teams prepare for post quantum cryptography?

FEB 14, 2023

How Should Security teams prepare for Post Quantum Cryptography?

Can new optical fibres fast-track Quantum Internet?

FEB 14, 2023

Can new optical fibres fast-track Quantum Internet?

Ingenious Encryption Breach – A Final Call

JAN 23, 2023

Ingenious Encryption Breach – A Final Call

Categories
Blog

The Future of Secure Encryption: Satellite Quantum Key Distribution

The Future Of Secure Encryption: Satellite Quantum Key Distribution

Deepika Aggarwal   |   May 08, 2021
The Future Of Secure Encryption: Satellite Quantum Key Distribution

Companies and governments around the world are in a race to build the first usable quantum computer. The technology promises to make some kinds of computing problems much, much easier to solve than with today’s classical computers, but it also poses a significant threat to the integrity of encrypted data.

A large-scale quantum computer would, for example, be capable of solving the prime-number factorization problem exponentially faster than classical computers. For authentication and data transmission, the widely used asymmetric encryption relies on the difficulty of solving just such mathematical problems. The arrival of effective quantum computers would thus lead to a fatal breakdown of the current security infrastructure.

Alternate “quantum-proof” methods of encryption are therefore required. Quantum Key Distribution (QKD) is one approach that exploits the fundamental laws of physics rather than specific mathematical assumptions. It is resistant to all known computational attacks, including those from future quantum computers.

The Need For Satellite Based Quantum Key Distribution

Ground-based QKD systems are commercially available today, but the range of communication of the current systems has been limited to a few hundred kilometers due to atmospheric losses or in-fiber attenuations. These limitations make purely ground-based systems impractical for a global distribution network.

Long-distance communication is far more important in meeting the security threat posed by quantum computers, for government, military, as well as business infrastructure. Interconnecting local QKD networks over international distances faces a huge technological hurdle: amplification or simple reception and retransmission of quantum states alters their properties and is thus fundamentally incompatible with QKD.

While “quantum repeater” might seem to be a solution, which allows single light particles to be stored, re-sent and manipulated without altering their state, but the related technology is still immature for practical implementations. Another solution, links with many “trusted relays”, can extend these distances from across a typical metropolitan area to intercity and even intercontinental distances. However, relays pose security risks.

Satellite based QKD systems offer the best approach for establishing a global-scale quantum network by using satellites that distribute secure keys to ground stations via free-space optical links.

The technology facilitates low photon loss and negligible signal disturbance (decoherence) in the empty out space. Propagation losses, which scale exponentially in fiber, scale only quadratically in free space and hence extend the range of quantum communication without compromising its security.

A satellite-based QKD system will ensure security over national and international distances, at a cost, much lower compared to ground-based fiber infrastructure for quantum-communications. By ensuring the secure distribution of cryptographic keys over globe-spanning distances, this space-based technology delivers ultra-secure, long-range communications capability at a level that cannot be achieved with ground-based fiber infrastructure.

Thus, a global QKD network of ground stations and satellites, using laser light to send secure secret keys, provides a great platform for securely connecting the world.

Related articles

‘Harvest now, decrypt later’ and the Quantum Revolution

JAN 11, 2021

‘Harvest now, decrypt later’ and the Quantum Revolution

Threat to National Security and Country’s Economy with Imminent arrival of Quantum Computers

DEC 21, 2020

Threat to National Security and Country’s Economy with Imminent arrival of Quantum Computers

Pharma firms at risk of cyberattacks: How companies can become 100% hackproof

JAN 27, 2021

Pharma firms at risk of cyberattacks: How companies can become 100% hackproof