The **_Internet of Things (IoT)_** enables any Internet Protocol (IP) device, from cars to coffee makers, to communicate across the globe, bringing unprecedented benefits for industry and consumers. However, IoT devices, especially at the **_lower-end of the market,_** are usually considered the **_weakest links_** in any network and are prone to malicious cyberattacks. Indeed, botnet attacks such as Mirai, which exploited 600,000 IP cameras and household routers, highlight **_the urgent need to secure the simplest IoT endpoints._**
IoT security technology must provide low-cost, easy to integrate, future-proof and 'chip-to-cloud' encryption. **_However, existing encryption technology is failing to meet all these market needs_** **_and will not be safe after the adoption of quantum computing._** Quantum computing allows many calculations in parallel and will break all encryption systems used today.
The famous Shor quantum algorithm has shown how quantum computing, once commercialised, can compromise widely-used public-key encryption like RSA (Rivest--Shamir--Adleman) in **_orders of magnitude faster_** than classical algorithms. Public-key cryptography systems such as RSA are essential for secure communication over the Internet and daily tasks like **_online banking, e-commerce, and secure messaging,_** to name just a few.
To address these deficiencies, **_Crypto Quantique's_** hardware solution measures the effects of **_quantum tunnelling_** (the ability of electrons to leak through the gates of transistors) to obtain completely random cryptographic keys **_on demand,_** with no exotic materials or correction codes. Coupled with our unique cryptographic software, Quarklink, our solution enables **_secure device onboarding_** to the cloud of thousands of IoT devices in minutes.
We have proven our technology in large process nodes (55nm), but our customers also want to ensure security across chips using lower process node technology **_(<28nm)_** and **_futureproofing_** against quantum attacks. However, this step-change introduces significant technical challenges related to transistor behaviour, gate leakage currents and post-quantum cryptography.
In this project, Crypto Quantique and Liverpool John Moores University (LJMU) will **_characterise and model <28nm device behaviour, develop novel digital techniques and design a unique, high-performance architecture_** to overcome the challenges at <28nm process technology.
Our German partner, CryptoEng, will develop **_quantum-resistant algorithms_** for general encryption and digital signatures. As such, we will help solve one of the most serious security problems facing the IoT, which currently costs Europe over **_€20bn per year_** and future-proof our technology for the coming advent of quantum computing.
The QRYPTON project will deliver a TRL8 demonstrator of a unique quantum-driven cryptographic solution to secure Internet of Things (IoT) devices. IoT devices must be secure as cyberattacks keep evolving and increasing. Globally, +1bn IoT attacks occurred in 2021, a 100% increase from 2020. IoT attacks cost Europe €20bn/year. Today, IoT devices are injected with secret keys by third parties during manufacture, which is risky, complex and expensive. Our solution completely eliminates this step by providing a patented silicon design (QDID) which easily integrates into any IoT device to generate multiple unforgeable keys on-demand. Exploiting the inherent randomness of quantum tunnelling at the oxide level of semiconductors, we can deliver the highest possible security. Keys are securely managed by our proprietary software (QuarkLink), which can use QDID or any other Root-of-Trust (RoT). This project will scale down QDID to deep submicron processes (<12nm) and productionise QuarkLink.
Zero-Touch project will deliver a step-change in cyber security by developing a unique Key Provisioning Architecture (KPA) for the generation, distribution, and certification of cryptographic keys used by IoT devices and the cloud. Together with our patent-protected Quantum-Driven Physical Unclonable Function (QD-PUF) technology, we will produce truly random cryptographic keys to deliver the strongest, end-to-end, cost-effective IoT security to protect devices from malicious cyber security attacks.