EN | KR
파트너 포털
Menu

양자 난수를 사용해 기본권을 보장 받으세요.

우리가 사는 세상은 더 긴밀하게 연결되고 있으며
이에 따라 데이터 보안의 중요성이 급부상하고 있습니다.
우수한 엔트로피 원천은 우리가 주목해야 할 데이터 보안의 핵심입니다.
사용된 보안 키의 강도는 키 생성에 사용된 임의성, 즉, 엔트로피의 우수성에 따라 결정됩니다.
보안 키의 강도에 따라 암호화 시스템의 효율성이 결정되어집니다.

엔트로피의 정도가 클수록 보안 키는 더욱 강해집니다.

최고의 엔트로피

확실한 안전,
사생활 보호,
현지생성

IDQ의 QRNG가 특별한 이유

일반적으로, 통신 네트워크를 통해 난수를 보내는 것은
사생활 노출의 위험성을 항상 내포하고 있습니다.
가장 안전한 방법은 양자 난수를 로컬에서 생성하여 전달하는 것입니다.
최고 수준의 보안을 위해서는 로컬 엔트로피 생성이 필요합니다.

IDQ의 QRNG가 특별한 이유가 여기에 있습니다.
어떤 장치든 보안을 강화하기 위해 IDQ의 QRNG를 사용하여
자체 최고의 엔트로피를 생성해 최고 수준의 보안에 도달할 수 있습니다.

qrng overview page image man on computer

모든 곳에 구현 가능한 양자난수 칩
The Quantis QRNG chip

세계에서 가장 작은 QRNG 칩을 만나보세요.
IDQ의 QRNG칩은 스마트폰을 포함한 모든 사물인터넷과 모바일 기기에
탑재할 수 있어 어느 누구나 양자 강화 보안을 이용할 수 있습니다.

 

View product

QRNG 사용 사례

IDQ의 QRNG 기술은 자동차, 국영 복권, HSM부터 IoT 기기, 스마트폰에 이르기까지 모든 분야에서 사용되고 있습니다.
다양한 폼 팩터와 특성은 IDQ의 QRNG를 어디서나 사용할 수 있도록 합니다.

samsung logo with image

삼성 갤럭시 퀀텀 4 스마트폰

세계 최초 양자 스마트폰, 양자 기술의 4번째
스마트폰 모델

QRNG는 높은 수준의 보안 인증과 정보 암호화를 가능하게 해줍니다. 이를 통해 사용자는 앱과 서비스를 더 안전하게 사용할 수 있습니다.

View use case

Octatco logo image

QRNG로 운영하는 EzQuant 보안키

세계 최초 퀀텀 FIDO 인증 지문 보안키

웹 서비스에 대한 완전한 보안, 물리적 보안
액세스와 암호 없는 온라인 인증을 위한 보안키

View use case

docusign logo image quantum

DocuSign, 양자 보안 전자 서명

QRNG 칩을 사용하여 가장 엄격한 보안 제공,
개인정보 보호 및 데이터 상주 요구 사항(FIPS/CC)을 충족하는 빠르고 쉬운 디지털 서명

View use case

QRNG is simply better

IDQ의 신기술, 양자 난수 생성기(QRNG)는 양자 물리학의 무작위 특성을 활용한 엔트로피 소스를 생성하여, 보안 키 생성을 위한 고품질의 시드 콘텐츠를 제공합니다.

진정한 무작위성

퀀티스 제품은 첫 번째 비트에서 진정한 무작위성을 생성하기 위해 본질적으로 무작위인 간단한 양자 물리적 프로세스를 사용합니다.

QRNG의 기초가 되는 양자 물리학이 반영되어 내부 작업을 정확하게 제어할 수 있습니다.

 

What’s the Q in QRNG?

입증된 보안

IDQ 양자 난수 생성기는 장애나 공격을 감지하기 위해 쉽게 모니터링할 수 있는 기본 구성 요소를 포함합니다.

영향을 끼칠 수 있는 외부 요소는 간단한 점검으로 배제할 수 있으며, QRNG가 항상 고품질 엔트로피를 생성하도록 보장합니다.

 

QRNG VS Others

Compliant & certified

IDQ는 모범 사례를 따르고 Quantis 제품에 대한 품질 및 보안 테스트를 지속적으로 수행하여 가장 까다로운 표준을 준수합니다.

퀀티스 제품은 국가 독립성과 품질을 보장하기 위해 전 세계 공인 시험 기관에서 인증을 받았습니다.

 

Certifications

Some of your QRNG questions answered

 

As you might expect, not all random number generators (RNG) are created equal. The degree of security is subject to several internal and external factors.

RNGs can basically be divided into two fundamental types: software and hardware. Software RNGs are also known as Pseudo RNGs or PRNGs, which gives you a clue to exactly how truly random the output is. Although they offer a low-cost introduction to randomness, the problem with PRNGs is that they are deterministic. The output of a PRNG depends deterministically on an input, known as the seed. To get good cryptographic randomness, the seed of a PRNG has to be both random and private, which brings us back to the original problem of how to generate this random seed.

Hardware devices allow us to get closer to true secure randomness. Unfortunately, the terminology is slightly confusing. The so-called True RNGs or TRNGs, are RNGs where the source of randomness relies on classical physics. In contrast, for Quantum RNGs or QRNGs the source of randomness is a quantum process. QRNGs are indeed True RNGs, but they are considered as separate. In both cases, since physical systems are not perfect, both TRNGs and QRNGs depend on some mathematical processing to reach perfect randomness. In order to adapt this processing to the source, the imperfections have to be well understood and monitored.

TRNGs require a physical source of randomness, which outputs digitized results of a measured physical event. TRNGs rely on classical physics, which is intrinsically deterministic. To obtain randomness, you have two solutions. One is to use an external noise source, which may be compromised, or may not be always available (for example in secure locations with controlled environment). The other is to rely on some complex process, which cannot be predicted easily. One typical example is a chaotic process, where the output depends on the minute details of the input.

In both cases, the randomness is created by complex interactions, either with an external system or through the temporal evolution of the system. It is not possible to fully monitor these physical processes, nor ensure their integrity. This introduces uncertainty in the cryptographic system and compromises its security.

For provably secure random number generation, you need to look to quantum physics for the answer. Quantum physics is fundamentally nondeterministic, producing unpredictable outcomes even in a robust and fully controlled environment.

Systems that rely on deterministic processes such as Pseudo Random Number Generators (PRNGs) to generate randomness are not secure because they rely on deterministic – thus predictable – algorithms.

A better solution is to use hardware random number generation. However, many still rely on classical physics processes that run in an uncontrolled and chaotic manner. This opens the door to cheating by controlling the environment or predicting the chaotic behavior in a better way.

The most reliable processes are based on quantum physics, which is is fundamentally random. In fact, the intrinsic randomness of subatomic particles’ behavior at the quantum level is one of the few completely random processes in nature. By tying the outcome of an RNG to the random behavior of a quantum particle, it is possible to guarantee a truly unbiased and unpredictable system through live verification of the numbers and monitoring of the hardware to ensure it is operating properly.

QRNGs are safer and more robust than classical TRNGs because the quantum entropy source is based on a simple, controlled and, most importantly, provably secure and unpredictable physical process. Moreover, many classical TRNGs are sensitive to environmental changes and thus vulnerable to undetected attacks or failures, while IDQ’s QRNGs offer a high degree of protection against external factors that could affect randomness thanks to a simple monitoring of a few key parameters.

Using a QRNG as a source of entropy makes a cryptographic system robust against attacks for the secure collection and transmission of sensitive data. Moreover, with IDQ’s QRNG chip, a QRNG can now be embedded locally, even for the protection of IoT and edge devices that are connecting home, cars, hospitals, factories, infrastructure, schools, and shopping locations. QRNGs can be trusted to make our connected world safer.

Yes! As random numbers are used everywhere, QRNG can of course be used everywhere.

Random numbers are used to ensure the legitimacy of gaming operations, to protect the privacy of sensitive data. Anyone with online access to their bank account relies on random numbers to generate security access keys for two-factor authentication. The most pervasive use of random numbers is in modern cryptography, strengthening the basis of any cyber security ecosystem.

The Public Key Infrastructure we all rely upon to secure the internet is dependent upon random numbers, as are all forms of data encryption. Random numbers are the source of encryption keys, used to secure data both at rest and in motion as it travels around an increasingly connected world.

IDQ offers various QRNG form factors: USB, PCIe cards, network appliance, and chips. Our world’s smallest QRNG chip is available in three models, depending on size, performance, power consumption and certifications, in order to fit various industry-specific needs. It can be embedded into any mobile, IoT, and edge device to benefit from QRNG.

Of course! IDQ was the first company to develop a QRNG in 2001 and has continued improving its successive generations of QRNGs. IDQ has also made quantum technology reach mass-market applications with its Quantis QRNG chip which has been successfully embedded into selected Samsung smartphones since 2020.

It remains the market leader in terms of flexibility, reliability and certification.

The highest level of security requires local generation of entropy. Sending the random number through a communication network always adds a risk to privacy.

Therefore, the safest bet will always be to have the quantum random number generating device on the local machine. However, in some instances, for example when the randomness does not need to be secret, or if it is generated in a secure environment, a centralized source may be used. The advantage is that the end-user does not need any hardware but can purchase random numbers as a service.

우리의 QRNG 제품을 온라인으로 구매하세요

최신 소식

뉴스레터에 등록해, 최신 뉴스 및 이벤트를 수신하세요

Home
HomeShop Online