
Our Approach
Arqit’s advantage
We minimise cyber risk while meeting customer needs in four key areas.Strong
Validated and proven security, compliant with modern frameworks
Simple
Small footprint and drop-in integrations with major OEM vendors
Scalable
Cloud-based, dynamic, and on-demand, with robust endpoint management
Standards-based
Works alongside industry standards and available in FIPS mode
Strong
We promote strong, symmetric cryptography
Symmetric Key Agreement is Arqit’s unique technology for data security.
1. Symmetric keys are the most secure
They aren’t vulnerable to quantum methods and are the gold standard for government and enterprise.
2. Independent formal verification
Arqit’s protocols have been formally validated using the Tamarin prover method by the Surrey Centre for Cyber Security and assessed by ISE.
3. We address the vulnerabilities of PKI
We don’t rely on public/private keys and we operate with zero-trust principles, improving upon traditional failings of PKI.
.png?width=1024&height=1024&name=Arqit_New_Brand_General%20(41).png)
Simple
Easy to integrate and highly performant
We use open interfaces to allow OEM partners to upgrade their solutions easily and without a performance penalty
Arqit’s multi-tenanted cloud platform orchestrates agents and provides high-level management tools | |
A single-core Arqit virtual agent sits within the endpoint’s network and handles communication with the cloud | |
The vendor solution interacts with the agent only when needed using a standards-based interface |
Scalable
Manage large numbers of endpoints with ease
Arqit’s SKA-Platform identifies, manages, and controls the interactions between endpoints with grouping and policy control
Our unique propositions
Quantum-safety today through our innovative and patented approach
Holistic approach
most competitors focus on one postquantum method, whereas Arqit embraces many complementary methods
Doesn’t require post-quantum algorithms
Arqit’s use of PQAs are limited to initial provisioning and customers can opt for symmetric-only provisioning
Strong, active authentication
based on symmetric methods with forward secrecy that doesn’t rely on PKI
Software only
no hardware required and can run as a virtualized network function
Easy to integrate
through existing OEM partner integrations, standards-based interfaces, or directly through SDK
Arqit’s SKA process
Provisioning, authentication, and key agreement
1
Every endpoint is securely provisioned once with a “bootstrap” key
2
Endpoints strongly, mutually authenticate with perfect forward secrecy
3
Groups of endpoints agree quantum-safe symmetric keys using material provided by Arqit SKA™