Feeds

UK crypto boffins turbo-charge quantum cryptography

Photodiodes get go-faster stripes

Using blade systems to cut costs and sharpen efficiencies

Boffins at Toshiba’s Cambridge Research Labs have developed a technique for turbo-charging the speed of quantum cryptography transmissions.

Quantum key distribution (QKD) systems currently operate at dial-up rates of less than 10 kbps for 20km, making them suitable only for point-to-point links. The Cambridge researchers have developed a technique for boosting these speeds by a factor of a hundred, increasing rates of transmission to above 1Mbps.

Crypto researchers have been able to boost transmission rates from the dial-up to broadband range. They used a single photon detector developed by Toshiba, which can work 100-times faster than earlier devices. Toshiba explains:

Current QKD systems are limited by the semiconductor devices (avalanche photodiodes) used to detect the single photons. One photon triggers an avalanche of millions of electrons in this semiconductor device which can be sensed by electrical circuitry in the QKD system. The problem in present systems is that some of these avalanche electrons can be trapped in the device and later stimulate a second spurious detection count. As these noise counts cause errors in the key, current detectors must be operated with long dead times to allow the decay of any trapped electrons. This limits the clock rate of current QKD systems to around 10 MHz and thus the secure key bit rate to under 10kbps for a 20 km fibre.

The Toshiba team has devised a method to detect much weaker electron avalanches. This strongly reduces the chance for an electron to be trapped, allowing the detector to be operated at much faster rates. Using this method Toshiba has increased the clock rate of their QKD system to 1.036 GHz, approaching the value used in conventional optical communications. This allows a raw bit rate of 9Mbps over 20 km of fibre, which in turn provides 1.02 Mbps of secure key. This is the first time that a secure bit rate exceeding 1Mbps has been achieved.

Although Toshiba's advance offers the possibility of creating kickass quantum crypto networks that support multiple users, the technology is unlikely to be commercially available for some time. Toshiba researchers have only demonstrated the advance in the lab and are yet to build even a fully functional prototype.

Nonetheless Toshiba said its technique allows a form of encryption that is theoretically unhackable for optical fibre networks connecting far more users than was previously possible. More information about Toshiba's research in quantum crypto can be found here.

News of Toshiba's research comes alongside the launch of a quantum cryptography network in Vienna, Austria, as part of a collaboration between crypto boffins across Europe on the SECOQC project. This network is based in part on older, lower-speed technology from Toshiba, which makes it unable to support more than eight users on a quantum cryptography network at any time.

Quantum cryptography systems are designed to allow the exchange of secret keys which can then be used in one-time pads, creating a theoretically unhackable system for the secure exchange and authentication of messages. The polarisation of individual light photons is used to signify each bit of a key.

The rules of quantum mechanics mean that any eavesdropper who intercepts this stream of photons will be unable to simply relay the data stream intact. Because of this effect, any attempt to eavesdrop on a quantum cryptography key would come across as a corrupt transmission across a unacceptable noisy link. Such keys would be dropped and transmission repeated until exchanges without interception take place. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.