본문 바로가기
Products

PRODUCTS

Security Chips

Quantum Security Chips

ICTK's Quantum Security Chips combine PQC (Post-Quantum Cryptography) and PUF (Physically Unclonable Function) technologies, delivering a next-generation quantum security chip with a robust Hardware Root of Trust (HRoT).

G5N

G5N, the world's first PUF–PQC integrated quantum security chip, delivers the strongest hardware-level security for the quantum computing era. By safeguarding quantum cryptographic keys within an unclonable chip, it provides an unmatched layer of protection against quantum threats.

Quantum Security Chip G5N
Crypto Algorithms AES-128/256, ECC-256, RSA-2048, SHA-256/3, ARIA-128/192/256
PQC Algorithms ML-KEM / ML-DSA
User Memory eFlash 43KB
Interfaces I2C / SPI
Operating Voltage Range 1.8 - 3.3V
Operating Temperature Range -40°C to 105°C
Power Consumption Sleep <3μA, Idle <3mA
Additional Features • Active Shield for Physical Tamper Detection
• TRNG
Supports Dual Algorithms (Conventional + PQC)
Compact, Low-Power Design
Resistant to Side-Channel Attacks

PQC-PUF eSIM / USIM

The world's first unclonable Quantum Security eSIM / USIM — experience truly secure communications.

PQC-PUF eSIM/USIM
Crypto Algorithms AES-128/256, ECC-256, SHA-256
PQC Algorithms ML-KEM / ML-DSA
User Memory eFlash 5KB
Interfaces I2C / ISO 7816(9600bps)
Operating Voltage Range 1.8 - 3.3V
Operating Temperature Range -40°C to 105°C
Power Consumption Sleep < 2μA
Subscriber Data Theft Prevention
Device Firmware Protection
Enhanced Secure Communication (Keys Encrypted by PUF)

Quantum Security SIM vs. Conventional SIM

Feature Conventional SIM PQC PUF SIM
Subscriber Authentication O O
Device Authentication & Management X O
Initialization X O
Re-activation X O
Authentication (ECC, F/W) X O
Device Encryption / Decryption X O
Subscriber Data Theft Prevention
Device Firmware Protection
Enhanced Secure Communication (Keys Encrypted by PUF)

Hardware-Based Quantum Security Chip

Coming Soon

H/W PQC
H/W PQC+MCU

Ready to Secure Your Future?

ICTK's quantum security experts will assess your security environment and recommend the optimal solution.