Light Reading
MagiQ Technologies unveils Navajo -- the first commercial quantum cryptography system -- at DEMO 2003

MagiQ Demos Quantum Cryptography

Light Reading
News Wire Feed
Light Reading
2/17/2003
50%
50%

SCOTTSDALE, Ariz. & NEW YORK -- MagiQ Technologies, Inc., (www.magiqtech.com) the quantum information processing (QIP) company, today unveiled the first commercial quantum cryptography system at DEMO 2003. The successful demonstration of Navajo, MagiQ's Quantum Key Distribution (QKD) system, is the first ever public display of a working, commercially-viable quantum cryptography system. By encoding information and placing single photons into quantum superposition, Navajo delivers secure, unbreakable and future-proof key distribution at unprecedented speeds that easily integrates into organizations' existing technology infrastructures. MagiQ today also officially announced the Navajo beta program, which currently includes ten sites within financial institutions, businesses and service providers across the United States. For additional information on the program or to become a beta site, please visit http://www.magiqtech.com/about/navajo.php. "We are honored to have been selected to publicly demonstrate Navajo for the first time ever to the attendees of DEMO 2003," said Bob Gelfond, founder and CEO of MagiQ. "We've been focused on taking the huge business benefits that have been promised by QKD in the lab, most notably unbreakable key distribution, and integrating the technology with the customer requirements that our beta sites have dictated. As the attendees of the event have seen, the result is an affordable solution that applies the principles and associated benefits of quantum cryptography with the requirements for the solution to be as plug and play as possible into organizations' existing IT infrastructures." The fundamental part of any cryptographic protocol is the encryption key - a string of random bits that are used to encode the data to be communicated between the parties. Exchanging this key with absolute certainty that it has not been "overheard" is a challenging task, and the solution to this problem lies in QKD. The security of quantum cryptography lies in its ability to exchange the encryption key with absolute security. By encoding the encryption key photon by photon and having more than one piece of information on each photon, quantum mechanics guarantees that the act of an eavesdropper intercepting a photon, even just to observe or read, irretrievably changes that photon. Therefore, the eavesdropper can neither copy nor clone a photon nor read more than one piece of information without destroying the other piece. This arises from Heisenberg's Uncertainty Principle: an eavesdropper listening in on the key distribution channel will necessarily leave traces -- and the more information the eavesdropper obtains, the greater the detectable disturbances. Consequently, the communicating parties can use part of their key to determine the presence of an eavesdropper and only use the key if appropriate. The use of continuous symmetrical quantum key regeneration and truly random numbers makes the data encryption absolutely secure. "MagiQ's Quantum Key Distribution system is at the forefront of new security technologies and provides unbreakable security, based on the laws of physics rather than mathematical algorithms," said Chris Shipley, executive producer of DEMO 2003. "The ability to constantly exchange encryption keys with absolute security is a huge benefit for security-conscious organizations in government and businesses with high-value intellectual property. I am delighted to have MagiQ unveil its next-generation security system at DEMO, as it's sure to play an active role in protecting our corporate and national IT infrastructures." Today's encryption solutions rely solely on computational difficulty for their security. The assumption is that it would take thousands of years of computer time to decrypt these messages using brute-force or various decryption algorithms. However, as computing power continues its dramatic rise, and new algorithms are developed, today's secrets could become vulnerable in the future - presenting major threats to countries' national security, corporations' intellectual property and confidential information in general. QKD is designed to provide security assurance for the long term, since it relies not on ever-changing computational difficulty, but on the fixed principles of physics. The Navajo QKD system cannot be cracked using mathematical algorithms or brute-force attacks. MagiQ Technologies Inc.

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
LRTV Documentaries
EE: The Road to 5G

12|16|14   |   16:02   |   (1) comment


Andy Sutton, the principal network architect at UK mobile operator EE, explains how his company is using Wembley stadium as a wireless test bed and how that's helping EE to plan the evolution to 5G.
LRTV Huawei Video Resource Center
Highlights of Huawei's NFV Open Cloud Forum 2014

12|16|14   |     |   (0) comments


Huawei hosted its inaugural NFV Open Cloud Forum during the SDN & OpenFlow World Congress 2014 in Düsseldorf, Germany. The Forum brought together technology thought leaders, senior executives and telecom professionals from global carriers, industry associations, as well as other partner companies in the ecosystem, to exchange views on and collectively explore how ...
LRTV Custom TV
Realizing Operators' Digital Vision

12|16|14   |   5:23   |   (0) comments


Leveraging technology is fundamental to digital transformation but understanding customers and serving them really well is at the heart of digital businesses. TM Forum lists the following as the strategic pillars of the digital business: business agility and rapid innovation, operational agility and effectiveness, IT and data centricity, plus customer centricity. ...
LRTV Documentaries
US Cellular Injects Analytics Into LTE

12|16|14   |   2:57   |   (1) comment


US Cellular's Mario Vela explains how the operator uses analytics for network planning and what comes next as the carrier looks to eke more value out of its metrics.
LRTV Interviews
How Cox Biz Plans to Keep Growing

12|15|14   |     |   (1) comment


Steve Rowley, SVP of Cox Business, details how the third-biggest US MSO intends to boost its revenues to $2 billion and beyond over the rest of the decade
LRTV Huawei Video Resource Center
Interview With Bill Zhang, Director of SoftCOM Product Management, Huawei

12|15|14   |   2:50   |   (0) comments


Bill Zhang elaborated on Huawei's open philosophy in NFV solution development and network architecture design at the SDN & OpenFlow World Congress 2014.
LRTV Huawei Video Resource Center
Event Highlights: Huawei at SDN & OpenFlow World Congress 2014

12|15|14   |   3:43   |   (0) comments


Huawei joined the 2014 SDN & OpenFlow Congress as one of the key sponsors and contributors. At the event, Huawei reinforced the openness and flexibility of its network infrastructure strategies, and provided updates on its SDN and NVF innovations. Through participations at the exhibitions, forums and speeches, Huawei encouraged the industry to "think bigger and ...
LRTV Interviews
How Cable Biz Services Hit $10B Mark

12|12|14   |     |   (1) comment


Cable operators reached $10 billion in annual business services revenues by delving deeper into their vertical markets and expanding beyond the smallest firms.
LRTV Documentaries
Mediacom Aims to Test Connected Tractors

12|11|14   |   05:07   |   (3) comments


Cable business service provider is taking its services to the 'agribusiness' sector in partnership with farm equipment specialist John Deere and is getting involved in Gigabit Cities developments.
LRTV Interviews
TWC Business Looks Beyond $3B

12|10|14   |     |   (0) comments


TWC Business Services chief Phil Meeks explains how his unit has reached $3 billion in annual revenues and what its plans are for next year.
LRTV Documentaries
AT&T's New Security Strategy

12|10|14   |   02:36   |   (1) comment


AT&T's Chief Security Officer Ed Amoroso explains how his company is wrapping virtual security layers around micro network domains.
LRTV Documentaries
2020 Vision: A First View

12|9|14   |   02:25   |   (3) comments


At the 2020 Vision Executive Summit in Iceland, unique Heavy Reading research shows that comms service providers are optimistic about the next five or so years.
Upcoming Live Events
February 10, 2015, Atlanta, GA
April 14, 2015, New York City, NY
May 6, 2015, McCormick Convention Center, Chicago, IL
May 13-14, 2015, The Westin Peachtree, Atlanta, GA
June 9-10, 2015, Chicago, IL
Hot Topics
Vodafone to Ride T-Mobile Back Into US
Dan Jones, Mobile Editor, 12/12/2014
Cisco Makes Big Analytics Push
Mitch Wagner, West Coast Bureau Chief, Light Reading, 12/11/2014
Gardner's Departure a Cautionary Tale
Carol Wilson, Editor-at-large, 12/12/2014
1-Gig: Coming to a Small Town Near You
Jason Meyers, Senior Editor, Gigabit Cities/IoT, 12/17/2014
T-Mobile Lights Up 27 Wideband LTE Cities
Sarah Reedy, Senior Editor, 12/15/2014
Like Us on Facebook
Twitter Feed
Webinar Archive