tops post-quantum
search
  • tops post-quantum

tops post-quantum

26 400,00 €
HT

Protect your Next-gen IoT
Today and beyond Quantum

Select options:

Credits: number of devices to be provisioned

Annual plan:

12 months subscription per volume category,
including maintenance and support

Pay-per-use:

number of Credits over unlimited time,
maintenance and support not included.
Spare hardware: replacement unit (hardware only, without credit).

Don't hesitate to contact us for assistance in defining your configuration.

Type d'achat : Matériel + Recharges
Choisissez votre formule : Abonnement annuel
Par tops plug&go : Jusqu'à 25K crédits par an + Maintenance
Matériel de rechange : 0 - pas de matériel de remplacement
Quantité

 

Conditions Générales

 

Expédition et retours

 

Politique de confidentialité

Protect your Next-gen IoT
Today and beyond Quantum

Post Quantum Algorithms

  • State-of-the-art post-quantum cryptography
  • Post-Quantum signature and key generation support
  • Support 15 variants of ML-DSA and SLH-DSA

Overproduction protection

  • Limit production quantity per production line
  • Real time monitoring or offline reports
Intellectual Property Protection
  • Your firmware are securely stored and never accessed by subcontractor
Asset Generation
  • Generate Keys and certificates
  • Generate serial number
  • Encrypt your data
  • And more operation without limitation

Asset protection

  • Keys and assets are securely stored
  • Strong protection using TPM certified EAL4+



illustrationOverview

Quantum computing is coming. Progress on these technologies are exponential.

NIST, ANSSI and all the expert predict that standard RSA and ECC algorithm will be broken by quantum computers in 2035, but recommend to start product migration starting from 2027

tops plug&go PostQuantum provide everything you need to generate and provision PQC keys, certificates and signature in your IoT devices.

In addition tops plug&go PostQuantum,

  • generates and provision digital identity in the device (Serial number, Certificate, …)
  • prevents overproduction by providing firmware and asset only the number of times you set for the production line
  • prevents counterfeiting and protect your intellectual property by storing firmware and never expose them to factory
  • provides realtime monitoring of the production
  • provides offline production control with signed reports
  • remotely secures configuration even offline, with secured a configuration file dedicated to your instance.
  • Has a versatile project configuration, that let you can generate as many assets per device as you want, securely inject partners secret data, take data from file or list, generate unique data per device, or common for all devices, manipulate data (concatenate, split, assemble, compute) before provisioning, encrypt them, and whatever your imagine for your project.



tops plug&go benefits:

1. Reduce cost

    • Automate your provisioning process
    • Support production millions of devices 
    • Versatile configuration to provision all you need in one step

2. Increase security

    • Protect your assets
    • Control the production
    • Prevent overproduction / counterfeiting

3. Solve Post-Quantum provisioning concern

    • Full support of PQC keys, certificates, and signatures
    • NIST PQC algorithms

Product features and services

Secure Computer

    • Portable  industrial computer
    • 64 GB SSD  for system
    • 1 TB SSD  for storage
    • TPM 2.0 / HSM
    • Secure OS and SW update
    • Secure connection  to the device programmer
    • Application server  with User interface (UI)

Resources

    • Credits for a preset number certificate provisioning
    • Technical support  for installation
    • Full set  of documentation

Services

    • Secure generation of Post-Quantum keys and certificates:
      • FIPS 204: 
        • ML-DSA-44
        • ML-DSA-65
        • ML-DSA-87
      • FIPS 205:
        • SLH-DSA-SHA2-128s
        • SLH-DSA-SHAKE-128s
        • SLH-DSA-SHA2-128f
        • SLH-DSA-SHAKE-128f
        • SLH-DSA-SHA2-192s
        • SLH-DSA-SHAKE-192s
        • SLH-DSA-SHA2-192f
        • SLH-DSA-SHAKE-192f
        • SLH-DSA-SHA2-256s
        • SLH-DSA-SHAKE-256s
        • SLH-DSA-SHA2-256f
        • SLH-DSA-SHAKE-256f
    •  Standard asymmetric key generation
      • RSA 1024, 2048, 3072, 4096
      • ECC standard curves with size from 224 to 521
    • Symmetric keys
      • AES 128, 192 and 256
      • HMAC-SHA256...
    • Management of a PKI tree:
      CA / intermediate CA / unique certificate SN
    • Interface and secure channel
      with any external PKI platform
    • Secure provisioning:
      serial number / certificates and keys injection into the programmable component
    • Unique Serial Number generation
    • Versatile configuration
      to generate data (text, keys, firmware), get them from list, encrypt, assemble and manipulate them, define if unique per device or common, and program them in device
    • Secure storage
      of all keys, certificates and assets are store encrypted in the programming facility
    • Overproduction control:
      limit production and get batches signed reports
TOPS-POST-QUANTUM
Commentaires (0)
Aucun avis n'a été publié pour le moment.