SlideShare una empresa de Scribd logo
1 de 31
SACON
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
Quantum Secure Network
Karunakaran M.T.
QNu Labs
C.T.O
Secret key + key-
ID
key-ID Secret keyRequest
Use Cases
Pharma network

• Quantum Key Distribution (QKD)
provides unconditional security by
generating an information theoretically
secure key, for “data in motion”
• Strength of the security is not just in
increasing strength of encryption but in
providing the key securely on either
end of a transaction.
• QKD guarantees quantum
randomness. This property allows us
to enhance security of the “data at
rest”.
• QKD from QNu, can enhance the
security of the healthcare IT
ecosystem by providing a Quantum
secure shield.
• QKD is an insurance against “harvest
now decrypt later”.
Quantum Channel
Key Interface
Quantum Channel (λ1)
Classical Channel for
QKD reconciliation
(fiber (λ2) or ethernet)
Encryptor
/
Router
Public Internet
Army Office 1
(Secure Key
Interface
Protocol)
Data
Applications
…..
VoIP
…..
Encryptor
/
Router
VoIP
…..
…..
Data
Applications
(Secure Key
Interface
Protocol)
Army Office 2
QNu Node 1
QNu Node 2
Quantum Secure key Quantum Secure key
Proactively
Quantum™ Secure quantum network for critical infrastructure
QKD multi node network
QN1
QN2
QN3
QN4
 R1
 R4
 R2
 R3
S1 S1
IPv4 network
K1
A B
K2
K3
K4
QSNN
QSNNN
QSNN
QSNN QSNN
QSNN
     
 
 
 
 
 
DB
VoIP
phone
DB
VoIP
phone
DB
VoIP
phone
DB
VoIP
phone
MHA
PMO
RAW /NTRO/IB
Sena Bhavan
Proactively
Quantum™
Proactively
Quantum™
Quantum reinforced Cloud security
• Quantum reinforced randomness & information theoretic security
• Paired HSMs have the same security properties of single HSM
HSMQ +
Cloud
computing
Store
HSM+ Q
Cloud
computing
Store
Fibre link
Proactively
Quantum™
Client Location 2
App Engineers
Client Location 1
App Engineers
Collaborative Quantum secure cloud computing
Q HSM
Cloud
computing Store
Q HSM
Cloud
computing Store
+
+
+
+
Q HSM
Cloud
computing Store
+
+
+
+
+
+
+
+
Proactively
Quantum™
A Metropolitan
Area Network
using QKD based
Link Encryptors
Proactively
Quantum™
Keys from the
Cryptographic Server
to End point Clients
transferred as OTP
Encrypted data using
keys provided by QKD
Proactively
Quantum™
Wide Area Network
(WAN)
using single Q-element
QKD links (Hop to Hop)
Proactively
Quantum™
Wide Area Network (WAN)
Using QKD mesh network
with Multi Q-element nodes
Proactively
Quantum™
Passive Optical Network (PON)
ONU – Optical Network
Unit
Use Case:
QKD Authenticated
Sensor Network
Proactively
Quantum™
QRNG and Entropy as a service
QRNG is a hardware random number generator where generation of
random numbers are based on the properties of quantum mechanics.
The quality of key generation is strongly dependent on entropy. EaaS
provides high entropy random data for use in cryptography.
Entropy is used in
Lottery, gaming, OS scheduling, simulators, AI algorithm.
Proactively
Quantum™ EaaS – Entropy as a Service
Harvest Now & Decrypt Later
Attack that will compromise National secrets and
security in an unprecedented manner
Proactively
Quantum™
Highly secure
software solution
platform
Scalable /Flexible
HARDWARE
Quantum
optics
Quantum
protocols
Quantum
Mechanics
Proactively
Quantum™
QKD Research
Framework
Proactively
Quantum™
What’s in the pack
• Build Alice / Bob
• Change algorithm / scheme for Quantum channel
• Collection of data for long term study and analysis of Quantum
channel
• Visualization of various parameters of the Quantum channel for
correlation study over longer periods of time
• AI (Artificial intelligence) and ML (Machine learning) can be used on the
data to arriving at better schemes and designing better performing
algorithms
• Build Eve for simulating Quantum attacks of various classes
• Quick prototyping / Proof of concept validation with focus on specific
aspects of the development
(SACON) M T Karunakaran  - Quantum safe Networks

Más contenido relacionado

La actualidad más candente

HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN ControllerHACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
Priyanka Aash
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
Rassul Ismailov
 

La actualidad más candente (20)

Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of Things
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
 
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN ControllerHACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security Headaches
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
 

Similar a (SACON) M T Karunakaran  - Quantum safe Networks

Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
Arpan Pal
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 

Similar a (SACON) M T Karunakaran  - Quantum safe Networks (20)

Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
NVIDIA Keynote #GTC21
NVIDIA Keynote #GTC21 NVIDIA Keynote #GTC21
NVIDIA Keynote #GTC21
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Sp_Tropos_v1.pdf
Sp_Tropos_v1.pdfSp_Tropos_v1.pdf
Sp_Tropos_v1.pdf
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDN
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
 
Contrail Enabler for agile cloud services
Contrail Enabler for agile cloud servicesContrail Enabler for agile cloud services
Contrail Enabler for agile cloud services
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
AhmetCemilKaratas
AhmetCemilKaratasAhmetCemilKaratas
AhmetCemilKaratas
 
[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With Contrail[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With Contrail
 
OpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service DeliveryOpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service Delivery
 
OpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service DeliveryOpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service Delivery
 
Manu sheelvant resume
Manu sheelvant resumeManu sheelvant resume
Manu sheelvant resume
 

Más de Priyanka Aash

Más de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

(SACON) M T Karunakaran  - Quantum safe Networks

  • 1. SACON SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur Quantum Secure Network Karunakaran M.T. QNu Labs C.T.O
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Secret key + key- ID key-ID Secret keyRequest
  • 10.
  • 11.
  • 12. Pharma network
 • Quantum Key Distribution (QKD) provides unconditional security by generating an information theoretically secure key, for “data in motion” • Strength of the security is not just in increasing strength of encryption but in providing the key securely on either end of a transaction. • QKD guarantees quantum randomness. This property allows us to enhance security of the “data at rest”. • QKD from QNu, can enhance the security of the healthcare IT ecosystem by providing a Quantum secure shield. • QKD is an insurance against “harvest now decrypt later”. Quantum Channel Key Interface
  • 13. Quantum Channel (λ1) Classical Channel for QKD reconciliation (fiber (λ2) or ethernet) Encryptor / Router Public Internet Army Office 1 (Secure Key Interface Protocol) Data Applications ….. VoIP ….. Encryptor / Router VoIP ….. ….. Data Applications (Secure Key Interface Protocol) Army Office 2 QNu Node 1 QNu Node 2 Quantum Secure key Quantum Secure key
  • 14. Proactively Quantum™ Secure quantum network for critical infrastructure QKD multi node network QN1 QN2 QN3 QN4  R1  R4  R2  R3 S1 S1 IPv4 network K1 A B K2 K3 K4 QSNN QSNNN QSNN QSNN QSNN QSNN                 DB VoIP phone DB VoIP phone DB VoIP phone DB VoIP phone MHA PMO RAW /NTRO/IB Sena Bhavan
  • 16. Proactively Quantum™ Quantum reinforced Cloud security • Quantum reinforced randomness & information theoretic security • Paired HSMs have the same security properties of single HSM HSMQ + Cloud computing Store HSM+ Q Cloud computing Store Fibre link
  • 17. Proactively Quantum™ Client Location 2 App Engineers Client Location 1 App Engineers Collaborative Quantum secure cloud computing Q HSM Cloud computing Store Q HSM Cloud computing Store + + + + Q HSM Cloud computing Store + + + + + + + +
  • 19. Proactively Quantum™ Keys from the Cryptographic Server to End point Clients transferred as OTP Encrypted data using keys provided by QKD
  • 20. Proactively Quantum™ Wide Area Network (WAN) using single Q-element QKD links (Hop to Hop)
  • 21. Proactively Quantum™ Wide Area Network (WAN) Using QKD mesh network with Multi Q-element nodes
  • 22. Proactively Quantum™ Passive Optical Network (PON) ONU – Optical Network Unit Use Case: QKD Authenticated Sensor Network
  • 23. Proactively Quantum™ QRNG and Entropy as a service QRNG is a hardware random number generator where generation of random numbers are based on the properties of quantum mechanics. The quality of key generation is strongly dependent on entropy. EaaS provides high entropy random data for use in cryptography. Entropy is used in Lottery, gaming, OS scheduling, simulators, AI algorithm.
  • 24. Proactively Quantum™ EaaS – Entropy as a Service
  • 25. Harvest Now & Decrypt Later Attack that will compromise National secrets and security in an unprecedented manner
  • 26.
  • 27.
  • 28. Proactively Quantum™ Highly secure software solution platform Scalable /Flexible HARDWARE Quantum optics Quantum protocols Quantum Mechanics
  • 30. Proactively Quantum™ What’s in the pack • Build Alice / Bob • Change algorithm / scheme for Quantum channel • Collection of data for long term study and analysis of Quantum channel • Visualization of various parameters of the Quantum channel for correlation study over longer periods of time • AI (Artificial intelligence) and ML (Machine learning) can be used on the data to arriving at better schemes and designing better performing algorithms • Build Eve for simulating Quantum attacks of various classes • Quick prototyping / Proof of concept validation with focus on specific aspects of the development