Feeds

Quantum crypto comes to Blighty

Yay!

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

UK reseller NOW Wireless has signed a deal to distribute MagiQtech's quantum cryptography solution, MagiQ QPN Security Gateway, in the UK.

Launched in the US in 2004, MagiqTech's two-box solution, provides secure quantum key exchange between two dedicated sites up to 120km apart. Once secure keys are exchanged, data can be encrypted using standard protocols, switching keys at up to 100 times per second.

The technology was first demonstrated outside the physics lab in July 2002 when a team from the University of Geneva and Swiss electronics company id Quantique exchanged keys across a 67km fibre optic network.

Quantum cryptography allows two users on an optical fibre network to form a shared key, the secrecy of which can be guaranteed. This takes advantage of the particle-like nature of light. In quantum cryptography, each transmitted bit is encoded upon a single light particle (or 'photon'). Intercepting the data randomly changes the polarisation of the light, irreversibly altering the data. This makes it impossible for a hacker to eavesdrop on the data without revealing his intervention.

There are a few problems with quantum cryptography, however. While it cannot be cracked, in the traditional sense of the word, it is susceptible to a denial-of-service-style attack. Although a hacker would still not be able to access any sensitive data, he could disrupt the key exchange and bring the system to a halt. It is also difficult to route, since the routing process itself would access, and thus disrupt the data being routed. Until this problem is solved, QC is limited to use between two dedicated points.

Some observers question the value of pursuing ever-harder encryption, pointing out that a system will be attacked at its weakest point, such as personal passwords, or software vulnerabilities. ®

Related stories

Maths boffins topple Certicom crypto
Japanese boffins advance quantum computing
Holy Grail of crypto to arrive in three years, say UK boffins

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?