Quantum Random Number Generator for security applications and online gaming
The Quantis Appliance is a network-attached device, which securely generates and delivers high-quality random numbers for security and cryptographic applications in enterprise, government, gaming, datacenter and cloud environments. The Quantis Appliance is designed for environments where high availability is crucial. It can be inserted in, or removed from, an operating network with no impact on any other appliance, such as servers, switches, encryptors, authentication servers and any security modules.
The random numbers generated by the Quantis Appliance are used for different applications: to generate high-quality cryptographic keys for encryption or authentication; to seed deterministic PRNGs and provide additional randomness for commercial security modules, or to provide entropy for mathematical simulations.
Additionally, the Quantis Appliance helps the gaming industry to move from a dedicated to a centralized random number generation architecture, functioning as the central node of a distributed network of randomness. This allows higher flexibility, easier maintenance, better protection against any kind of physical tampering, and higher ROI.
The Quantis Appliance serves as a hardware source of trust for cloud or distributed environments, with both Linux and Windows operating systems. It provides secure keys for Virtual Machines (VMs), Virtual Private Networks (VPNs), and remote desktops. It is also used in Randomness-as-a-Service (RaaS) or Security-as-a-Service (SaaS) environments.
Performant and simple
The Quantis Appliance is an autonomous device, which integrates seamlessly through standard REST API into different types of networks. The system architecture has been specifically developed with parallelizable processes that allow to serve multiple servers with true randomness at minimized latency and offer the best performance without compromising security, even at peak times. It is able to serve 8’000 requests of 256-bit keys per second from multiple threads in parallel. The Quantis Appliance can also be put in streaming mode where it delivers random bits on the fly.
For troubleshooting, the Quantis Appliance generates syslog alerts in case of failure of the power supplies, CPU and RAMs, and failure to provide QRNG data on a request. The watchdog control guarantees low maintenance efforts, ensuring an automatic restart of the Quantis Appliance if any error or malfunction occurs.
Reliable and Secure
The new Quantis Appliance was specifically designed to meet the requirements of high availability environments with a robust FIPS/NEBS compliant chassis, redundant power supplies and hot-swap redundant fans. The Quantis Appliance also supports Hot Standby feature using keepalive and the VRRP protocol.
Remote access to the appliance is possible only from allowed IP addresses and authorized users with password. SSL certificates are configurable by the admin user only.
IDQ follows best practices and continually performs quality and security testing on its Quantis quantum random number generation products, in line with the recommendations from the most demanding standard institutions worldwide. All IDQ QRNG products pass NIST SP800-90B, SP800-22 and DieHarder tests.
The Quantis Appliance serves as a hardware source of trust for cloud or distributed environments, with both Linux and Windows operating systems. The Linux entropy pool is notoriously bad as it has little access to external entropy sources apart from disc interrupts and other fluctuations. By installing a daemon on the Linux host, the Quantis Appliance monitors the kernel entropy pool and feeds entropy into the pool e.g for establishing secure SSL connection. As this is done on the level of the Linux entropy pool, the FIPS or other security certifications of the crypto stack are retained.
: Uncaught wfWAFStorageFileException: Unable to save temporary file for atomic writing. in /home/clients/2bfcf3402443a33365386417eb931b09/web/wordpress/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/storage/file.php:35
#0 /home/clients/2bfcf3402443a33365386417eb931b09/web/wordpress/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/storage/file.php(659): wfWAFStorageFile::atomicFilePutContents('/home/clients/2...', '<?php exit('Acc...')
#1 [internal function]: wfWAFStorageFile->saveConfig('livewaf')
thrown in /home/clients/2bfcf3402443a33365386417eb931b09/web/wordpress/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/storage/file.php on line 35