Qrypt Logo

Date: 11/21/2024

Vendor: Qrypt

Technology/Topic: Quantum Entropy and Quantum Secure Encryption

URL: https://www.qrypt.com

TEM Presentation Video (milTube)

______________________________________________

Welcome to the Technical Exchange Meeting (TEM)!

Qrypt is a quantum secure encryption company.  Qrypt is dedicated to advancing quantum security through strategic partnerships with prestigious US National Laboratories: Oak Ridge and Los Alamos National Labs. Our technologies, patented and exclusively licensed, reflect our approach to innovation. Qrypt quantum random number generators (QRNGs) are developed with stringent assembly practices, adhering to international standards of control and security, ensuring a reliable US supply chain for highly regulated businesses. Also, we would like to note that the entropy generated by the Qrypt Quantum Entropy Appliance/QRNG appliance (QEA) is continuously tested using the NIST SP800-22 entropy source validation test suite. Qrypt also has utilized a FIPS-compliant server chassis as the foundational build blueprint for our QEA solution. Our commitment to addressing quantum threats, aligning with the global imperative to secure digital infrastructures.

Leveraging Qrypt’s QRNG foundational capabilities, we have built on-premises QRNG capabilities. We have partnered and integrated our quantum entropy capabilities into market-leading technologies such as Palo Alto, Fortanix, Thales and Nvidia. We enable quantum secure communications, AI data in motion and key generation, and can deliver up to One Time Pad encryption to protect against Nation State threats and protect against the threat of HNDL, today.

Qrypt strongly believes that QRNG-based random should be utilized as the cryptographic foundation for FIPS 203, 204 and 205 related encryption applications, given the scientifically proven true randomness of quantum phenomena. In addition, Qrypt will support and enable the transition to PQC compliance, importantly however, Qrypt offers an additional layer of security to protect against HNDL, and the reliance upon a single algorithm and PKI infrastructure, by establishing key generation, instead of key transmission.     

______________________________________________

IMPORTANT NOTE: If you are logging in using a non-DoD device, you cannot join using a logged-in Microsoft Teams account (i.e., your organization’s Microsoft Teams login). You need to open the DoD365-J Microsoft Teams meeting link using a browser; ignore any prompts to login to the Teams thick-client application and join as a guest. The following document illustrates logging into DoD365-J Microsoft Teams using a non-DoD Device: https://zadar.us/tem/wp-content/guidance/Accessing-DoD365-MS-Teams-via-Non-DoD-Device.pdf 

______________________________________________

The video recordings, slide decks, and applicable TEM artifacts for completed TEM sessions are accessible from the public TEM website: https://zadar.us/tem 

Upcoming TEM events can be viewed at the following site: https://zadar.us/tem/schedule.html

To join the DISA TEM mailing list, please contact: disa.tem@mail.mil

Please feel free to forward this invitation to any interested parties.

______________________________________________

Disclaimer:

— TEMs do not serve as a marketing venue or request for proposal actions.

— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.

— TEMs do not serve as an endorsement of any presented technologies or capabilities

— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.

— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly facing content is permissible in DISA TEM sessions.

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.