& cplSiteName &

MagiQ Demos Quantum Cryptography

Light Reading
News Wire Feed
Light Reading
2/17/2003
50%
50%

SCOTTSDALE, Ariz. & NEW YORK -- MagiQ Technologies, Inc., (www.magiqtech.com) the quantum information processing (QIP) company, today unveiled the first commercial quantum cryptography system at DEMO 2003. The successful demonstration of Navajo, MagiQ's Quantum Key Distribution (QKD) system, is the first ever public display of a working, commercially-viable quantum cryptography system. By encoding information and placing single photons into quantum superposition, Navajo delivers secure, unbreakable and future-proof key distribution at unprecedented speeds that easily integrates into organizations' existing technology infrastructures. MagiQ today also officially announced the Navajo beta program, which currently includes ten sites within financial institutions, businesses and service providers across the United States. For additional information on the program or to become a beta site, please visit http://www.magiqtech.com/about/navajo.php. "We are honored to have been selected to publicly demonstrate Navajo for the first time ever to the attendees of DEMO 2003," said Bob Gelfond, founder and CEO of MagiQ. "We've been focused on taking the huge business benefits that have been promised by QKD in the lab, most notably unbreakable key distribution, and integrating the technology with the customer requirements that our beta sites have dictated. As the attendees of the event have seen, the result is an affordable solution that applies the principles and associated benefits of quantum cryptography with the requirements for the solution to be as plug and play as possible into organizations' existing IT infrastructures." The fundamental part of any cryptographic protocol is the encryption key - a string of random bits that are used to encode the data to be communicated between the parties. Exchanging this key with absolute certainty that it has not been "overheard" is a challenging task, and the solution to this problem lies in QKD. The security of quantum cryptography lies in its ability to exchange the encryption key with absolute security. By encoding the encryption key photon by photon and having more than one piece of information on each photon, quantum mechanics guarantees that the act of an eavesdropper intercepting a photon, even just to observe or read, irretrievably changes that photon. Therefore, the eavesdropper can neither copy nor clone a photon nor read more than one piece of information without destroying the other piece. This arises from Heisenberg's Uncertainty Principle: an eavesdropper listening in on the key distribution channel will necessarily leave traces -- and the more information the eavesdropper obtains, the greater the detectable disturbances. Consequently, the communicating parties can use part of their key to determine the presence of an eavesdropper and only use the key if appropriate. The use of continuous symmetrical quantum key regeneration and truly random numbers makes the data encryption absolutely secure. "MagiQ's Quantum Key Distribution system is at the forefront of new security technologies and provides unbreakable security, based on the laws of physics rather than mathematical algorithms," said Chris Shipley, executive producer of DEMO 2003. "The ability to constantly exchange encryption keys with absolute security is a huge benefit for security-conscious organizations in government and businesses with high-value intellectual property. I am delighted to have MagiQ unveil its next-generation security system at DEMO, as it's sure to play an active role in protecting our corporate and national IT infrastructures." Today's encryption solutions rely solely on computational difficulty for their security. The assumption is that it would take thousands of years of computer time to decrypt these messages using brute-force or various decryption algorithms. However, as computing power continues its dramatic rise, and new algorithms are developed, today's secrets could become vulnerable in the future - presenting major threats to countries' national security, corporations' intellectual property and confidential information in general. QKD is designed to provide security assurance for the long term, since it relies not on ever-changing computational difficulty, but on the fixed principles of physics. The Navajo QKD system cannot be cracked using mathematical algorithms or brute-force attacks. MagiQ Technologies Inc.

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Featured Video
From The Founder
John Chambers is still as passionate about business and innovation as he ever was at Cisco, finds Steve Saunders.
Flash Poll
Upcoming Live Events
June 26, 2018, Nice, France
September 12, 2018, Los Angeles, CA
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 17, 2018, Chicago, Illinois
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
NFV Is Down but Not Out
Iain Morris, News Editor, 5/22/2018
Trump Denies ZTE Deal, Faces Senate Backlash
Dan Jones, Mobile Editor, 5/22/2018
What VeloCloud Cost VMware
Phil Harvey, US News Editor, 5/21/2018
5G in the USA: A Post-BCE Update
Dan Jones, Mobile Editor, 5/23/2018
Vanquished in Video, Verizon Admits OTT Defeat
Mari Silbey, Senior Editor, Cable/Video, 5/23/2018
Animals with Phones
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed