Three team for quantum-safe IoT SIM tech

Three team for quantum-safe IoT SIM tech

Business news |
By Nick Flaherty

Zariot has teamed up with Kigen and Crypto Quantique for quantum-safe protection of cellular devices in the Internet of Things (IoT).

The Zariot technology uses the controller core in a SIM for cellular IoT applications. It is working with ARM SIM spinout Kigen and encryption specialist Crypto Quantique to provide zero-touch, secure communication for device on-boarding.

Zariot has deployed the Crypto Quantique technology directly on a non-volatile area of the SIM, giving cellular IoT native access to their technology for the first time.

The QuarkLink technology from Crypto Quantique ensures the security is verifiable from SIM manufacturer through to data transmission across the entire chain.

Zariot uses Kigen’s fully certified facilities in both manufacture – GSMA Security Accreditation Scheme for UICC Production (SAS-UP), and management – GSMA Security Accreditation Scheme for Subscription Management (SAS-SM). These regularly audited programmes guarantee supply chain security, as well as support customer device certification processes.

This also uses the IoT-SAFE programme from the GSMA, extended to use the SIM controller for authentication, encryption, and other applications.

Kigen’s IoT-SAFE is used as a root-of-trust and together with the embedded code baseline from Crypto Quantique, it can fully secure connections between device(s), Crypto Quantique’s QuarkLink security management platform, and an enterprise’s data centre or cloud service provider.

Crypto Quantique raises $8M to address IoT security

The SIM can also be used as an alternative to Crypto Quantique’s industry leading QDID – a dedicated secure element – designed to protect even at the point of Quantum computing supremacy. Both fulfil different roles within a diverse IoT estate, complimenting each other and creating a consolidated cross function and cross network solution. This removes administrative complexities, speeding deployment, and simplifying end-to-end data security.;;

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News


Linked Articles