Company Makes its Patent-Pending, Out-Of-Band Key Delivery Technology Available as a Service with the Launch of Phio TX Cloud
Quantum Xchange, a leader in quantum-safe products and services for crypto agility and quantum readiness, today announced the general availability of Phio Trusted Xchange (TX) Cloud. The first-of-its-kind crypto-agile key distribution system, now delivered as a cloud service, enables users to enhance the security of Public Key Infrastructure (PKI) in the cloud with robust quantum-safe, out-of-band key delivery. As a result, clients can immediately boost the security of their existing crypto infrastructure; better protect transmitted data between enterprise and cloud environments with the strongest encryption available today; and realize the flexibility, scalability, and rapid deployment of a cloud delivery model.
Advances in computing and mathematics continue to push the boundaries of how best to secure data in motion. Phio TX Cloud differs from other quantum-safe crypto services for hybrid cloud environments in that it is vendor agnostic and seamlessly integrates with leading cybersecurity products and can be dropped into any existing crypto environment. It is the only key distribution system that supports all forms of quantum keys – both math and physics-based i.e., Post-Quantum Crypto (PQC) algorithms, Quantum Random Number Generated (QRNG) keys, Quantum Key Distribution (QKD) or a combination.
The simple overlay architecture consists of one or more Phio TX nodes that make up the hive or mesh network in the cloud. Phio TX Cloud generates and delivers symmetric keys upon request to a pair of encryption devices to create an encrypted channel without using TLS-style inline key-negotiation techniques. The secure key transfer is protected by PQC and/or QKD in a FIPS 140-2 validated implementation. The exchange of key-encrypting-keys is delivered out-of-band allowing organizations to avoid brute-force, side-channel, and SSL harvesting attacks because an attacker is unaware that a secondary key is in play protected by NIST PQC candidate algorithms or a quantum key secured by the laws of quantum mechanics.
Phio TX Cloud nodes can receive entropy from a QRNG running on a single physical Phio TX-Q appliance, which enables the use of quantum entropy for key generation within the cloud infrastructure. This reduces the chance of key duplication when generating keys across a high volume of virtual machines.
“With multi-cloud environments and data traveling across platforms – from the data center to public clouds and to edge environments – strong security for data-in-motion is paramount,” said Gene Savchuk, Chief Product Evangelist and Strategic Advisor at Quantum Xchange. “Add to these concerns the looming quantum threat and harvesting attacks and security-conscious organizations must ask themselves: why wouldn’t I want my cloud environments to be quantum-safe now? With Phio TX, we’re delivering to clients the highest level of encryption to protect data in the hybrid era and into the quantum future.”
The rise of hybrid cloud as the de facto architecture for enterprise cloud adoption has been largely driven by security concerns. In a recent IDC survey, nearly 70% of respondents worried about the security of their data and applications in the public cloud. As the volume and reliance on data continues to grow, and new regulatory pressures intensity, enterprises are seeking new and more advanced encryption methods to better protect data privacy, mitigate risks, and future-proof their crypto infrastructure for the arrival of quantum computers.
These cyber-aware organizations – especially those in highly regulated industries – want crypto-agile solutions that can work within their existing environment; instantly make their traditional crypto quantum-resistant; meet evolving data privacy and security requirements; and provide an easy onramp to maximum QKD security if needed. Only Quantum Xchange satisfies all of these requirements, giving organizations choice and a crypto-agile infrastructure that can easily scale and evolve with the threat landscape.