Feeds

Quantum Key Distribution proven to work over everyday fibre

Quantum security without dedicated fibre

Remote control for virtualized desktops

A group which in 2012 gave a laboratory demonstration of quantum key distribution (QKD) using lit fibre has taken its next step, demonstrating its technology in a field trial in the UK.

Two years ago, El Reg reported the National Physical Laboratory (NPL) led a project that achieved a 500 Kbps key distribution rate on a 50km fibre that was also carrying 1 Gbps of conventional optical network traffic in both directions.

Now, the NPL's group has conducted a field trial of the technology using a BT link between its Adastral Park laboratory in Suffolk and another BT site in Ipswich, about 18 km away as the crow flies.

Other participants in the project included Toshiba Research Europe (which provided the quantum kit), British Telecom, and ADVA Optical Networking (which provided encryption equipment).

The achievement is a big step towards widespread deployment of QKD. While commercial products exist today, they require a dark fibre between the two ends of the link to carry the quantum information – and that's expensive because those who lay fibres like them to be used as often as possible.

As the NPL release states: “The use of a single fibre is significant, as both the quantum 'key' and the encrypted data can now use the same pathway for the first time. Previously, two or three fibres were needed to deliver a secure connection.”

The problem the research group had to overcome is noise. QKD encodes encryption keys onto the quantum states of small numbers of photons, which need to be both counted and measured by the receiver. If an attacker tries to eavesdrop on the key exchange, the quantum states are destroyed, revealing the presence of the attacker.

However, other signals on the same fibre present as noise to the quantum channel – and noise destroys the quantum states you're trying to detect. Filtering out the noise was the key to this demonstration, according to Toshiba Research Europe's Andrew Shields.

NPL's Alastair Sinclair said his organisation's contribution to the research was developing techniques to measure the individual photons, “which we are using to independently verify the security of the system”. ®

Internet Security Threat Report 2014

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.