Skip to content
1574331660_Arqit_Images_Hero_1920x_0000s_0020_iStock-519824539

Our Approach

Arqit’s advantage

We minimise cyber risk while meeting customer needs in four key areas.
Strong
Validated and proven security, compliant with modern frameworks
Simple
Small footprint and drop-in integrations with major OEM vendors 
Scalable
Cloud-based, dynamic, and on-demand, with robust endpoint management
Standards-based
Works alongside industry standards and available in FIPS mode
Strong

We promote strong, symmetric cryptography

Symmetric Key Agreement is Arqit’s unique technology for data security.

 

1. Symmetric keys are the most secure

They aren’t vulnerable to quantum methods and are the gold standard for government and enterprise.

2. Independent formal verification

Arqit’s protocols have been formally validated using the Tamarin prover method by the Surrey Centre for Cyber Security and assessed by ISE.

3. We address the vulnerabilities of PKI

We don’t rely on public/private keys and we operate with zero-trust principles, improving upon traditional failings of PKI.

Arqit_New_Brand_General (41)
Simple

Easy to integrate and highly performant

We use open interfaces to allow OEM partners to upgrade their solutions easily and without a performance penalty

 

Arqit’s multi-tenanted cloud platform orchestrates agents and provides high-level management tools 
A single-core Arqit virtual agent sits within the endpoint’s network and handles communication with the cloud
The vendor solution interacts with the agent only when needed using a standards-based interface

 

Arqit_New_Brand_General (42)

Scalable

Manage large numbers of endpoints with ease

Arqit’s SKA-Platform identifies, manages, and controls the interactions between endpoints with grouping and policy control

Diagram_9
Standards-Based

Works alongside industry standards

FIPS 140-3 validated product logo image in color

 

 

Our standards-based hybrid approach maximises compatibility, offers cryptoagility, and minimises risk

 

 

Diagram_10

Our unique propositions

Quantum-safety today through our innovative and patented approach

Holistic approach most competitors focus on one postquantum method, whereas Arqit embraces many complementary methods  
Doesn’t require post-quantum algorithms Arqit’s use of PQAs are limited to initial provisioning and customers can opt for symmetric-only provisioning  
Strong, active authentication  based on symmetric methods with forward secrecy that doesn’t rely on PKI  
Software only  no hardware required and can run as a virtualized network function  
Easy to integrate through existing OEM partner integrations, standards-based interfaces, or directly through SDK  

Arqit’s SKA process

Provisioning, authentication, and key agreement

 

Diagram_11_a
1
Every endpoint is securely provisioned once with a “bootstrap” key
Diagram_11_b
2
Endpoints strongly, mutually authenticate with perfect forward secrecy
Diagram_11_c
3
Groups of endpoints agree quantum-safe symmetric keys using material provided by Arqit SKA™

Talk to an Expert