Shop Online Mobile Phones
  • No products in the list
Back to Applications

Quantum Random Number Generation (QRNG) for mobile phones

Increased mobile phone security through quantum technology: Today’s digital activities – from mobile banking and online purchases to messages over social media and work emails – have turned mobile phones into a goldmine of financial, health, business and personal information, raising the need for security to the edge.

205 billion
Mobile apps downloaded in 2018

 

2 billion* people
(40% of the word’s adult population) use mobile banking apps
*Juniper Research

People install more and more mobile apps, beautifully designed by developers – cautious about providing a smooth and convenient experience – but they are rarely conscious about the security implications.

Banking applications and many others require the collection and transmission of a large amount of sensitive information including digital identification and use phone security algorithms to generate keys to encrypt client’s data securely​. Transmissions and data are protected by cryptographic algorithms​ using random numbers for encryption, digital signing, and hashing – the basic cryptographic implementations that protect everything digital.


QRNG offers strengthened security to mobile phone users

Generating strong keys from a reliable entropy source is the cornerstone of any security system.

Private communications, information and finances are protected by a cryptographic algorithm which can be seen like a lock on a phone. This lock protects all the information and can only be opened by a key created for that lock.

If hackers steal or figure out what the exact key is, they’ll have access to the sensitive information. By feeding quantum randomness into your systems, you make this key more secure from hackers.

Encryption keys that protect information are composed of random numbers that should be impossible to decipher nor predict. The key is the secret element which must remain unknown to the public​. To be secure, the key must be generated in an unpredictable way​.

​The more random the sequence is, the more protected the information will be​. Quantum random number generators (QRNGs) have the advantage over conventional randomness sources of being invulnerable to environmental perturbations and of allowing live status verification.

When using a Quantum RNG, you are 100% sure that your outcome is truly random and unlike Pseudo RNGs which need to accumulate external entropy, you are also sure to get full entropy (randomness) instantaneously from the very first photon (bit).

Current processors and SoC on the market have encryption embedded inside​. Mobile phones use this encryption for applications security, and for transmission security. But the embedded encryption has embedded random number generators (RNG)​ which are not Quantum RNG therefore not as secure​.

We know that digitalization is more important than ever, and that security challenges are evolving towards the quantum level. Security practices must therefore evolve too: Quantum RNGs should replace embedded RNGs to provide a better key, therefore better security from existing embedded encryption engines.

More about QRNG


The word’s first QRNG chip designed for mobile phone security

ID Quantique recently introduced its true Quantum Random Number Generator (QRNG) Chip, which offers the highest attainable security and robustness for the generation of random bits.

It is ideal for use in mobile phone, automotive, computing, critical infrastructure, IoT and security applications where compact size and resistance to external environmental perturbations are critical.IDQ’s QRNG chip is available in three models, depending on size, performance, power consumption and certifications, in order to fit various industry-specific needs.

Quantis QRNG IDQ250C2 is the first Quantum Random Number Generator designed and manufactured specifically for mobile handsets, IoT and edge devices. With its low profile, compact size and low power consumption, it is ideal for securing the collection and transfer of sensitive data at the edge.

In May 2020, ID Quantique and SK Telecom announced to the world the first 5G smartphone equipped with a Quantum Random Number Generator (QRNG) chipset.

By integrating a Quantum Random Number Generator (QRNG) into its new Samsung Galaxy A Quantum smartphone, Samsung has added quantum technology to smartphone security for SK Telecom to provide the highest level of trust for customer’s sensitive information.

ID Quantique was the first company to develop a quantum random number generator (QRNG) in 2001 and it remains the market leader in terms of reliability and certifications, with its Quantis QRNG product family. The operation of Quantis is continuously monitored and if a failure is detected the random bit stream is immediately disabled.

In addition, unlike PRNGs which need to accumulate external entropy, Quantis provides full entropy (randomness) instantaneously from the very first photon (bit). IDQ’s quantum random number generators (QRNG) offer high quality entropy for use in highly secure crypto operations and solutions requiring proven and certified randomness.

IDQ is actively developing new QRNG products for its customers in various fields like automobile, consumer electronics, computer and mobile, financial, gaming and security markets.

Our quantum technology provides the most secure encryption keys today and in the quantum computing era, guaranteeing the highest level of trust for consumers.

View the Quantis QRNG Chip


Vulnerabilities and cybersecurity threats in mobile phone applications

57%
of total digital media time is spent on smartphones and tablets

 

89%
of vulnerabilities can be exploited using malware

According to the Mobile Phone security report* published in 2019, high-risk vulnerabilities were found in 38% of mobile applications for iOS and in 43% of Android applications. Insecure data storage is the most common issue, found in 76% of mobile applications. Passwords, financial information, personal data, and correspondence are at risk.

Many cyber attacks rely on user inattention while most cases are caused by weaknesses in security mechanisms. Because such vulnerabilities creep in during the design stage, fixing them requires significant changes to code.

In many cases, risks are the product of several seemingly small deficiencies in various parts of the mobile application. Taken together, these oversights can add up to serious consequences, including financial loss.

*Report: Vulnerabilities and threats in Mobile applications, 2019

Home
HomeShop Online