• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Security platform manages public key infrastructure for embedded IoT networks

March 11, 2025 By Aimee Kalnoskas Leave a Comment

Crypto Quantique demonstrated the QuarkLink Hybrid PQC security platform at Embedded World 2025. The company also showcased its latest analog and digital silicon IP offerings for device security.
QuarkLink is an integrated, scalable, cloud-based software platform that reduces the time and expense of implementing all necessary security functions in embedded device IoT networks and industrial PCs by up to 10X. It manages device identities, supports secure boot and firmware-over-the-air (FOTA) updates, and generates and manages security keys, digital certificates, and Public Key Infrastructure (PKI). This uniquely comprehensive set of functions enables embedded device developers to achieve European Cyber Security Resilience Act (CRA) compliance for devices faster, at lower cost, and with lower risk.
The Cyber Resilience Act (CRA) legislation establishes required timelines for implementation, with products needing to accept secure Firmware Over The Air (FOTA) updates by September 11, 2026, and full compliance with all aspects of the act required by December 11, 2027. This implementation process involves technical complexity, requiring embedded engineers to manage multiple tools, platforms, and processes simultaneously. The QuarkLink solution addresses these implementation challenges through its comprehensive feature set, simplifying compliance tasks for various stakeholders responsible for organizational cybersecurity, from development teams to Chief Security Officers.
QuarkLink integrates client libraries for popular MCU families and supports Linux distributions in industrial PCs. Recently updated with a post-quantum cryptographic algorithm, the platform provides security against classical attacks and future protection against threats from quantum computers. It also protects against “store-now/decrypt-later” attacks. In these, cybercriminals harvest encrypted data to decrypt in the future when more advanced computing resources become available.
Crypto Quantique also highlighted its growing family of lightweight root-of-trust silicon IP blocks and highly optimized cryptographic primitives. These are built upon the company’s proven physical unclonable function (PUF), QDID, and a quantum random number generator (QRNG), both of which are NIST compliant, PSA Level 2 Ready, and CC EAL4+ compliant.

You may also like:


  • What can be done to prepare for post quantum cryptography?

  • Post-quantum crypto standardization — background

  • Post-quantum crypto standardization — what’s the end game?

  • Post-quantum crypto standardization — what’s next?

  • Post-quantum crypto standardization — where we are

Filed Under: Applications, Embedded, Embedded World 2025, Events, IoT, Security, Software Tagged With: cryptoquantique

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

RSS Current EDABoard.com discussions

  • What is the purpose of the diode from gate to GND in normal Colpitts oscillator Circuits?
  • Antiparallel Schottky Diodes VDI-Load Pull
  • interfacing gsm and gps in proteus
  • 12VAC to 12VDC 5A on 250ft 12AWG
  • My array have wrong radiation pattern

RSS Current Electro-Tech-Online.com Discussions

  • how to work on pcbs that are thick
  • Actin group needed for effective PCB software tutorials
  • Kawai KDP 80 Electronic Piano Dead
  • Doing consultancy work and the Tax situation?
  • How to repair this plug in connector where wires came loose

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy