Skip to content
  • ×
  • Create new content
    • Sign In
    • Apply for Membership
  • EC Webcasts
  • Power Perspectives™
  • Special Issues
  • PowerSessions™
  • Sponsors
  • Home
  • Community
    • Q&A
    • Posts
    • Members
    • Experts
    • Influencers
  • Groups
    • The Power Industry Network™

      Utility Business Network
      EnergyBiz® Network
      • Utility Professionals
      • Utility Management 
      • Customer Care 
      • HR & Recruitment
      • Resource Management
      Generation Network
      Generation Network
      • Generation Professionals
      • Clean Power Group
      Energy Management Network
      Energy Management Network
      • Load Management
      • Energy Efficiency
      Intelligent Utility Network
      Intelligent Utility® Network
      • Digital Utility
      • Mobile Workforce
      Grid Network
      Grid Network
      • Grid Professionals
      • Transmission Professionals
      Energy & Sustainability Network
      Energy & Sustainability
      Network
      • The Energy Collective
      • Oil & Gas Professionals
      • Clean Energy Business Network
      • Enel Foundation
  • Topics
  • Jobs
  • News
  • Calendar
  • Resources
    • Podcasts
    • Case Studies
    • White Papers
    • Recorded Webinars
  • Subscribe
  • ×
  • Create new content
    • Sign In
    • Apply for Membership

Q-Net Security

Q-Net Security produces hardware that creates an impenetrable barrier between defined endpoints within your existing network.

  • Follow
  • Posts
  • Jobs
  • Contributors
x
 
 
About

Q-Net Security (QNS) provides security by design. Even if the design is known to an attacker, secrecy is not compromised because of the randomly generated keys. This contrasts with systems that provide security by way of shared secret. These systems are often described as security-through-obscurity and are vulnerable if ever the shared secret is exposed. The QNS design is patented and installation requires only simple network understanding without any advanced cybersecurity knowledge.  QNS devices are placed in-line and nearby the endpoints to be secured.  No external key management is necessary. All keys are generated locally when they are needed. They can be set to be refreshed as frequently as every packet.  Strong symmetric encryption is used to provide quantum compute-resistant security including strong authentication that includes non-repudiation. The QIO units work as a part of distributed firewall and provide true micro-segmentation.  Network telemetry can be collected at the remote locations and may be processed to complement other tools for a full picture of the network health and activity.  Once deployed, the QNS devices never need to be upgraded or patched.

QNS achieves superior security through a hardware security barrier that incorporates the True Random Number Generator (TRNG) delivering up to one million keys per second to enable packet-level encryption, where each packet or transaction can have a unique and truly random key. This is known as a Derived Unique Key Per Transaction (DUKPT) scheme. In this scheme, if a single key is compromised, both future and past transactions are still protected. The QNS key management scheme monitors key entropy continuously to assure its randomness.  This permits industry-leading, secure communications anywhere, even over public links including LTE and the Internet.  The QNS approach removes all opportunities for an attacker to ever discover a security key, thereby thwarting many internal exploits as well as remote attacks.

This hardware-based solution offers superior security, yet it is fast and easy to deploy.  The in-line hardware I/O elements (QIOs) are small devices that secure precious data flowing between every endpoint in a network.  Complete security is built directly into each QIO’s silicon.  Creating security directly in silicon avoids the use of vulnerable software and/or Operating Systems which are both stored program-based. The heart of a general-purpose processor is its set of stored programs, which require frequent updates to patch newly discovered security flaws. 

The core of the hardware-enabled solution is AES encryption (using 256-bit keys) and a novel symmetric Just-in-time Key (JitKey) distribution that can provide a unique random key for each packet.  The keys are not discoverable by man or machine and require no active key management or key filling.  There are no secret algorithms; everything about the QIO is assumed to be public knowledge yet the chances of cracking a JitKey packet are infinitesimal. Compromising a single data packet provides no information to assist in cracking the next.  While each packet is encrypted using different keys, transmission efficiency is very high (greater than 97% throughput). 

Connect with Q-Net Security

Fill out this form to receive more information from Q-Net Security.

Q-Net Security would like permission to contact you by email or phone (depending on the information you provided above) and if you agree, Energy Central will securely deliver your information to Q-Net Security. If you choose to not share your information, you can still access this article or resource.

This information will only be used by Q-Net Security to contact you about their services.

Energy Central
Our Mission
Our mission at Energy Central is to help global power industry professionals work better. Our Power Industry Network™ platform is built to help our members connect with each other, share their knowledge & experience and advance their careers in the industry. Membership is open to professionals working at utilities and organizations supporting the industry.

Energy Central

  • About Us
  • Advertise with Us
  • Participate!
  • Membership
  • FAQs
  • EC Professional News

Policies

  • Community Standards
  • Privacy Policy
  • Terms of Service

Get Social

  • Twitter
  • LinkedIn
  • Facebook

Stay Connected

  • Subscribe
  • Follow via RSS
  • Contact Us