Feeds

Quantum crypto comes to Blighty

Yay!

  • alert
  • submit to reddit

3 Big data security analytics techniques

UK reseller NOW Wireless has signed a deal to distribute MagiQtech's quantum cryptography solution, MagiQ QPN Security Gateway, in the UK.

Launched in the US in 2004, MagiqTech's two-box solution, provides secure quantum key exchange between two dedicated sites up to 120km apart. Once secure keys are exchanged, data can be encrypted using standard protocols, switching keys at up to 100 times per second.

The technology was first demonstrated outside the physics lab in July 2002 when a team from the University of Geneva and Swiss electronics company id Quantique exchanged keys across a 67km fibre optic network.

Quantum cryptography allows two users on an optical fibre network to form a shared key, the secrecy of which can be guaranteed. This takes advantage of the particle-like nature of light. In quantum cryptography, each transmitted bit is encoded upon a single light particle (or 'photon'). Intercepting the data randomly changes the polarisation of the light, irreversibly altering the data. This makes it impossible for a hacker to eavesdrop on the data without revealing his intervention.

There are a few problems with quantum cryptography, however. While it cannot be cracked, in the traditional sense of the word, it is susceptible to a denial-of-service-style attack. Although a hacker would still not be able to access any sensitive data, he could disrupt the key exchange and bring the system to a halt. It is also difficult to route, since the routing process itself would access, and thus disrupt the data being routed. Until this problem is solved, QC is limited to use between two dedicated points.

Some observers question the value of pursuing ever-harder encryption, pointing out that a system will be attacked at its weakest point, such as personal passwords, or software vulnerabilities. ®

Related stories

Maths boffins topple Certicom crypto
Japanese boffins advance quantum computing
Holy Grail of crypto to arrive in three years, say UK boffins

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.