본문 바로가기
Tech for Quantum

TECH FOR QUANTUM

Quantum Technology

Quantum Security? Ask ICTK!

With Quantum-Resilient PUF, ICTK designs the future of security
and leads the quantum-resilient era.

Quantum Security Overview

> system_monitor.log

Current Status: Vulnerable

Threat Level: Escalating

Recommended: PQC Migration

WHY
QUANTUM?

Quantum Security - The Time to Start is Now.

Delaying the transition to quantum security only increases your costs and risks.

Compromised Cryptography

COMPROMISED CRYPTOGRAPHY

Conventional Cryptography Is No Longer Secure

  • Mathematical limitations of traditional public-key cryptography
  • Public-key algorithms such as RSA and ECC are vulnerable to Shor's Algorithm
  • RSA-2048 can be theoretically decrypted using Shor's Algorithm
  • The number of physical qubits achieved today is already approaching the theoretical threshold for decryption
Quantum Acceleration

QUANTUM ACCELERATION

The Quantum Era Has Already Begun

  • Google and IBM have successfully demonstrated quantum computers
  • Quantum computing power is growing exponentially every year
  • Quantum Cloud (QaaS) services make quantum access available to anyone
  • Attackers now have an environment where quantum technology is within reach
HNDL Attack Strategy

EVOLVING THREATS

Evolving Hacking Trends & Corporate Trust

  • Long-term data exposure risks: proprietary designs, transactions, source technologies
  • Hack Now, Decrypt Later (HNDL) attacks emerging
  • Security breaches erode corporate trust
  • Threaten business continuity in finance and telecom sectors
  • Lead to enormous recovery costs and legal liabilities
Global Transition

REGULATIONS & STANDARDS

Regulations and Standards

  • NIST PQC Standard (2024): PQC migration required by 2035
  • NIST IR 8547: RSA/ECC deprecation by 2031, prohibition by 2035
  • EU & UK: Sensitive data subject to HNDL prioritized before 2030, full transition by 2035
  • Japan: High-risk systems transition by 2030, full completion by 2035
  • KpqC Standard in Korea (2025): Non-compliance may result in exclusion from public projects

QUANTUM-READY TODAY WITH ICTK

Perfect Quantum Security of ICTK

Combining PQC for algorithmic resilience with PUF for key protection -
establishing a truly Quantum-Trusted foundation.

PQC Post-Quantum Cryptography

Hardware & Software Algorithms
with Side-Channel Attack Protection

Root Key PUF-based HRoT

Top-level keychain free from
cloning and theft

Secure Storage PUF-Key Encrypted

The most secure storage
encrypted with PUF

PUF

PUF ISO/IEC 20897

Root Key

Root Key

PUF-based HRoT

Top-level keychain free from cloning and theft

  • VIA PUF™-based Root Key
  • No NVM storage required (generated on operation)
  • Seed Key for PQC
  • Encryption key for secure storage
  • PQC-based security operations
  • Secure bootloader & firmware verification
  • Cryptographic accelerators (AES, SHA, HMAC)
  • Tamper resistance
PQC

PQC

Hardware/Software Algorithms

Quantum-resilient algorithms with side-channel attack protection

  • U.S. Standard PQC Algorithms (FIPS 203/204/205)
  • Korean Standard PQC (KpqC) (HAETAE, SMAUG-T)
  • Legacy algorithm compatibility (RSA, ECC)
  • Software encryption support for servers (modules) and embedded systems
  • Hardware encryption support: Embedded silicon IP for PQC acceleration
Secure Storage

Secure Storage

PUF-Key Encrypted

The most secure storage encrypted with PUF

  • PUF-Key encrypted storage
  • Safe key management: PQC private keys & user authentication keys
  • Tamper-proof firmware data storage
  • Secure parameter storage for system configurations
  • Protection against physical and side-channel attacks

Quantum Security Products

ICTK's quantum security products, built on VIA PUF technology,
are offered in various forms to establish a robust Chain of Trust.

Root of Trust

Root of Trust (HRoT)

Immutable trust anchor based on VIA PUF technology

Bootloader

Bootloader

Secure boot and integrity verification

Firmware/OS

Firmware/OS

Secure system operating environment

Application

Application

Trusted application execution

Communication / Data

Communication / Data

End-to-end encrypted communication

PRODUCT LINEUP

Quantum Security Products

From chipsets to modules and solutions. ICTK provides a secure environment at every layer.

Quantum Security Chip

Quantum Security Chip | G5N

The starting point of hardware-based security for the quantum era

Quantum Security eSIM

Quantum Security eSIM/USIM

A new standard in communication security protected by PUF

Quantum Security Module

Quantum Security Module

A modular solution built on the foundation of security

Quantum Security Solutions

Quantum Security Solutions

A trusted network resilient against quantum threats

Ready to Secure Your Future?

ICTK's quantum security experts will assess your security environment and recommend the optimal solution.