QDefender Logo

Date: 03/26/2025

Vendor: QDefender Cyber Technologies

Technology/Topic: Quantum Defender

URL: https://qdefender.tech

TEM Presentation Slide Deck

______________________________________________

Welcome to the Technical Exchange Meeting (TEM)!

QDefender develops a unique implementation of Cyber Security based on real One-Time-Pads (OTP) usage, along with extremely high volume True-Random-Number-Generator (TRNG) production. This OTP based technology is applied in Multi-Point to Multi-Point Data and Network encryption, Data integrity (protecting data manipulation), and user authentication, in transit or at rest. Our unique solution incorporates OTP with ZKP (Zero Knowledge Protocol) for constant authentication on every bit of data, as well as signature validation based on Lamport One-Time signature scheme for Data Integrity.

While there are mainly two categories for Key Distribution Protocol, our Protocol can be described as an enhanced PQC, at high volume. Our interfaces are integrative and can also implement or interface with other protocol categories, such as QKD. For key management, we have a coordination server that does not open the ciphered message, rather adds another OTP that converts it for further usage, so that there is total oblivion for each party to the sender’s OTP info. This allows Zero Knowledge Trust (ZKT), creating Secure Access Service Edge (SASE), as well as Always-On continuity without duplicating keys (Real OTP), and with reauthentication on every bit. Utilizing OTP encryption and One-Time-Signature for Data Integrity and User Authentication, on every bit, secures against Man In The Middle Attacks (MITMA). In case of a stolen OTP on the user side, damage is isolated to the specific end-point without leakage to the system, and no information, logic, or algorithm can be inferred to future usage.

Our technology is not impacted by throughput or key length, as standard encryptions are, and actually has low resource usage and very small latency, while maintaining encryption on every bit. TRNG production is abundant (in high volume) and separate from the usage of the keys, hence OTPs can be produced in advance and stored for peak-time usage, and can be used for other actions, such as user authentication, One-Time-Signature, and protecting access to data storage (Data Vault).

______________________________________________

To join the DISA TEM mailing list, please contact: disa.tem@mail.mil

______________________________________________

Disclaimer:

— TEMs do not serve as a marketing venue or request for proposal actions.

— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.

— TEMs do not serve as an endorsement of any presented technologies or capabilities

— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.

— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly facing content is permissible in DISA TEM sessions.

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.