The Internet of Things (IoT) is one of the fastest growing areas of technology on the planet. In a digitally transformed world, people are using IoT connected devices for more and more services; from healthcare, to personal finance and the monitoring of utility consumption.
Virtually every aspect of life is being enhanced with the help of applications running in every device, all connected in the Internet of Things. Vacuum cleaners, cars, lights, kettles and fridges are all getting an internet connection and a processor to run applications. .
While providing a smooth and convenient customer experience, one wonders about the security implications of these devices. As with almost all emerging technologies, there comes an associated cybersecurity risk raising the need for security to the edge.
The recent 2020 Unit 42 IoT Threat Report found that the general security posture of IoT devices is declining, leaving organisations vulnerable to new IoT-targeted malware as well as older attack techniques that IT teams have long forgotten. IoT devices are perceived as a low hanging fruit by attackers, and their vulnerability makes them easy targets which are often used as a steppingstone to attack other systems on the network.
What if one of your IoT device is hacked? It opens a door to all your devices connected to the internet, collecting data and communicating with each other. Even the simplest and least expensive IoT device needs to have the highest level of security and trust.
IoT devices today, with 50 billion predicted by 2030
of all IoT device traffic is unencrypted
IoT devices require the collection and transmission of a large amount of sensitive information such as personal health and financial data. They also include digital identification and use security algorithms to generate keys to encrypt clients’ data securely. Transmissions and data are normally protected by cryptographic algorithms using random numbers for encryption, digital signing, and hashing – the basic cryptographic implementations that protect everything digital.
Private communications, information and finances are protected by a cryptographic algorithm which can be seen like a lock on the device. This lock protects all the information and can only be opened by a key created for that lock. If hackers steal or figure out what the exact key is, they’ll have access to the sensitive information. By feeding quantum randomness into your systems, you make this key more secure from hackers. Generating strong keys from a reliable entropy source is the cornerstone of any security system.
Encryption keys that protect information are composed of random numbers that should be impossible to decipher nor predict. The key is the secret element which must remain unknown to the public. To be secure, the key must be generated in an unpredictable way.
The more random the sequence is, the more protected the information will be. Quantum random number generators (QRNGs) have the advantage over conventional randomness sources of being invulnerable to environmental perturbations and of allowing live status verification. When using a Quantum RNG, you are 100% sure that your outcome is truly random and, unlike Pseudo RNGs which need to accumulate external entropy, you are also sure to get full entropy (randomness) instantaneously from the very first photon (bit).
Current processors and SoC on the market have encryption embedded inside. IoT devices use this encryption for applications security, and for transmission security. But the embedded encryption has embedded random number generators (RNG) which are not Quantum RNG therefore not as secure. We know that digitalization is more important than ever. We know that security challenges are evolving towards the quantum level. Security practices must therefore evolve too: Quantum RNGs should replace embedded RNG to provide a better key, therefore better security from existing embedded encryption engines.
Quantum randomness generates the strongest keys, providing the highest level of trust.
ID Quantique recently introduced its true Quantum Random Number Generator (QRNG) Chip, which offers the highest attainable security and robustness for the generation of random bits.It is ideal for use in mobile phone, automotive, computing, critical infrastructure, IoT and security applications where compact size and resistance to external environmental perturbations are critical.
IDQ’s QRNG chip is available in three models, depending on size, performance, power consumption and certifications, in order to fit various industry-specific needs.
Quantis QRNG IDQ250C2 is the first Quantum Random Number Generator designed and manufactured specifically for mobile handsets, IoT and edge devices. With its low profile, compact size and low power consumption, it is ideal for securing the collection and transfer of sensitive data at the edge.
In May 2020, ID Quantique and SK Telecom announced to the world the first 5G smartphone equipped with a Quantum Random Number Generator (QRNG) chipset.By integrating a Quantum Random Number Generator (QRNG) into its new Samsung Galaxy A Quantum smartphone, Samsung has added quantum technology to smartphone security for SK Telecom to provide the highest level of trust for customer’s sensitive information.
IDQ’s quantum technology provides the most secure encryption keys today and in the quantum computing era, guaranteeing the highest level of trust for consumers.