Feeds

UK crypto boffins turbo-charge quantum cryptography

Photodiodes get go-faster stripes

5 things you didn’t know about cloud backup

Boffins at Toshiba’s Cambridge Research Labs have developed a technique for turbo-charging the speed of quantum cryptography transmissions.

Quantum key distribution (QKD) systems currently operate at dial-up rates of less than 10 kbps for 20km, making them suitable only for point-to-point links. The Cambridge researchers have developed a technique for boosting these speeds by a factor of a hundred, increasing rates of transmission to above 1Mbps.

Crypto researchers have been able to boost transmission rates from the dial-up to broadband range. They used a single photon detector developed by Toshiba, which can work 100-times faster than earlier devices. Toshiba explains:

Current QKD systems are limited by the semiconductor devices (avalanche photodiodes) used to detect the single photons. One photon triggers an avalanche of millions of electrons in this semiconductor device which can be sensed by electrical circuitry in the QKD system. The problem in present systems is that some of these avalanche electrons can be trapped in the device and later stimulate a second spurious detection count. As these noise counts cause errors in the key, current detectors must be operated with long dead times to allow the decay of any trapped electrons. This limits the clock rate of current QKD systems to around 10 MHz and thus the secure key bit rate to under 10kbps for a 20 km fibre.

The Toshiba team has devised a method to detect much weaker electron avalanches. This strongly reduces the chance for an electron to be trapped, allowing the detector to be operated at much faster rates. Using this method Toshiba has increased the clock rate of their QKD system to 1.036 GHz, approaching the value used in conventional optical communications. This allows a raw bit rate of 9Mbps over 20 km of fibre, which in turn provides 1.02 Mbps of secure key. This is the first time that a secure bit rate exceeding 1Mbps has been achieved.

Although Toshiba's advance offers the possibility of creating kickass quantum crypto networks that support multiple users, the technology is unlikely to be commercially available for some time. Toshiba researchers have only demonstrated the advance in the lab and are yet to build even a fully functional prototype.

Nonetheless Toshiba said its technique allows a form of encryption that is theoretically unhackable for optical fibre networks connecting far more users than was previously possible. More information about Toshiba's research in quantum crypto can be found here.

News of Toshiba's research comes alongside the launch of a quantum cryptography network in Vienna, Austria, as part of a collaboration between crypto boffins across Europe on the SECOQC project. This network is based in part on older, lower-speed technology from Toshiba, which makes it unable to support more than eight users on a quantum cryptography network at any time.

Quantum cryptography systems are designed to allow the exchange of secret keys which can then be used in one-time pads, creating a theoretically unhackable system for the secure exchange and authentication of messages. The polarisation of individual light photons is used to signify each bit of a key.

The rules of quantum mechanics mean that any eavesdropper who intercepts this stream of photons will be unable to simply relay the data stream intact. Because of this effect, any attempt to eavesdrop on a quantum cryptography key would come across as a corrupt transmission across a unacceptable noisy link. Such keys would be dropped and transmission repeated until exchanges without interception take place. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.