Origin of symmetry
The natural evolution of encryption
Arqit confronts an existential threat to the hyperconnected world
The legacy encryption that we all use, designed in the 1980s has done a great job but is now failing us. It was never intended for use in our hyper-connected world.
The breaches caused are seen around us daily. But, there is a bigger problem. Quantum computing now poses an existential threat to cyber security for everyone.
As a result, the world must begin a global upgrade cycle to replace all encryption technologies, an upgrade unlike anything we have seen before.
There is no need to patch and mend, or to take risks with incremental improvements to public key encryption which is no longer fit for purpose.
Symmetric keys are provably secure against any attack, including quantum computing. But until now, there was no safe way to distribute them. Arqit gives you a method to create those keys at scale, securely, at any kind of endpoint device. Arqit’s product, QuantumCloud™ is symmetric encryption, reborn for the cloud.
"Arqit has a simpler, more secure way for applications to use the internet. The layered approach that Arqit proposes is really awesome"
'Founding Father' of SSL.
PKI & Certificate Management
Public Key Infrastructure (PKI) is a disconnected, offline technology
It is not always suited for a highly connected, centralised, online business network. In our hyperconnected world the number of endpoint devices a business must manage beyond its firewall is increasing rapidly. This is intensifying the PKI management burden.
Manual Key Delivery
Many governments and enterprises do not trust PKI in their core networks
and are still reliant on people to transport their cryptographic keys around the globe to protect their networks. Aside from the increased cost and environmental impact, this introduces more vulnerabilities and results in poor refresh rates.
The quantum threat is coming...
As the pace of development of quantum computers is accelerating, the implications for companies around the world are huge
Within this decade quantum computers will likely be able to break PKI. Core business systems and networks must move away from using PKI – so we must do it once and do it right.
So called post quantum algorithms are not mature enough to be relied upon and will introduce new complications, before being compromised themselves by either classical or quantum attack. No public key algorithm can ever be described as “Quantum Safe”.
Symmetric encryption keys, and the AES256 Symmetric Algorithm which uses them are known to be secure against quantum attack. Arqit has found a secure way to use them at scale.
Zero Trust is an architectural concept built around the idea that systems should not inherently trust any connection to a business system or application
regardless of what trusted device or trusted network it originated from – everything should be identity driven. This has meant many companies have adopted PKI based technologies to help secure authenticated users and authenticate devices and systems. This opens up companies to a whole set of potential PKI vulnerabilities today, as well as the threat from quantum computers tomorrow, and ironically also brings in an entire federated trust model with it. QuantumCloud™ can provide the encryption keys needed for a zero trust architecture without the larger attack surface, without the PKI trust model and protects companies against future threats from quantum computers.
Technical Thought Leadership
QuantumCloud™ is deep tech, but could not be easier to use
QuantumCloud™ puts a lightweight agent at any endpoint device. This software creates an unlimited number of symmetric keys with partner devices. The process is very simple and fast, but it is powered by quantum satellites in the cloud. Those satellites use a revolutionary new quantum protocol which solves all of the previously known problems of quantum key distribution. That’s how we create a backbone of secure keys within data centres all over the world, and a quantum safe boundary protecting those data centres. The QuantumCloud™ end point software then uses that quantum safe boundary to create new keys with a new cryptographic technique, unlike anything seen before.
QuantumCloud™ allows you to enrol your endpoint devices, using a policy based engine. This enforces security standards and determines your symmetric encryption refresh rate. Symmetry is a fundamental part of nature – and it’s fundamental in our solution, too.
You can create an infinite number of symmetric key pairs, of any length up to one-time-pad, in groups as large as you need. Keys are never “delivered”. So they cannot be intercepted. They are created, trustlessly at the endpoints. Use them once and discard them.
The megatrends powering the Fourth Industrial Revolution - IoT, Automation, Mobility will not be realised without a transformation in cyber security which in one bound takes us permanently beyond the reach of quantum attack.
With symmetric encryption reborn for the cloud, Arqit does just that.
Expertise you can trust
World class expertise across all domains
The Arqit team of innovators are world class. Our highly-experienced team of physicists, mathematicians, cryptographers and engineers have collaborated to create a new body of cryptographic inventions in both the quantum and classical realms.
With over 1,000 patent claims, our body of inventions is profoundly important and unlike anything developed before. You can depend on us.
Significant Distribution Partners Secured in Stealth Mode
5G and OPEN-RAN
The incredible power of Next Generation mobility is imperilled by the increased cyber attack surface. Arqit has solved this problem.
Fixed Line Networks
Unless the control plane of global networks is secure, no customer can trust it.
The power of automation will liberate us, but only if the automated machines can be trusted.
Our financial payments are already under attack, and quantum computers threaten all of the digital assets in the world.
The Smart City of the future offers happier, easier living, but only if our self-sovereign identity and its use can be secured.
The future of the battle space must be secured against well funded state actors with quantum computers.