Light Reading
MagiQ Technologies unveils Navajo -- the first commercial quantum cryptography system -- at DEMO 2003

MagiQ Demos Quantum Cryptography

Light Reading
News Wire Feed
Light Reading
2/17/2003
50%
50%

SCOTTSDALE, Ariz. & NEW YORK -- MagiQ Technologies, Inc., (www.magiqtech.com) the quantum information processing (QIP) company, today unveiled the first commercial quantum cryptography system at DEMO 2003. The successful demonstration of Navajo, MagiQ's Quantum Key Distribution (QKD) system, is the first ever public display of a working, commercially-viable quantum cryptography system. By encoding information and placing single photons into quantum superposition, Navajo delivers secure, unbreakable and future-proof key distribution at unprecedented speeds that easily integrates into organizations' existing technology infrastructures. MagiQ today also officially announced the Navajo beta program, which currently includes ten sites within financial institutions, businesses and service providers across the United States. For additional information on the program or to become a beta site, please visit http://www.magiqtech.com/about/navajo.php. "We are honored to have been selected to publicly demonstrate Navajo for the first time ever to the attendees of DEMO 2003," said Bob Gelfond, founder and CEO of MagiQ. "We've been focused on taking the huge business benefits that have been promised by QKD in the lab, most notably unbreakable key distribution, and integrating the technology with the customer requirements that our beta sites have dictated. As the attendees of the event have seen, the result is an affordable solution that applies the principles and associated benefits of quantum cryptography with the requirements for the solution to be as plug and play as possible into organizations' existing IT infrastructures." The fundamental part of any cryptographic protocol is the encryption key - a string of random bits that are used to encode the data to be communicated between the parties. Exchanging this key with absolute certainty that it has not been "overheard" is a challenging task, and the solution to this problem lies in QKD. The security of quantum cryptography lies in its ability to exchange the encryption key with absolute security. By encoding the encryption key photon by photon and having more than one piece of information on each photon, quantum mechanics guarantees that the act of an eavesdropper intercepting a photon, even just to observe or read, irretrievably changes that photon. Therefore, the eavesdropper can neither copy nor clone a photon nor read more than one piece of information without destroying the other piece. This arises from Heisenberg's Uncertainty Principle: an eavesdropper listening in on the key distribution channel will necessarily leave traces -- and the more information the eavesdropper obtains, the greater the detectable disturbances. Consequently, the communicating parties can use part of their key to determine the presence of an eavesdropper and only use the key if appropriate. The use of continuous symmetrical quantum key regeneration and truly random numbers makes the data encryption absolutely secure. "MagiQ's Quantum Key Distribution system is at the forefront of new security technologies and provides unbreakable security, based on the laws of physics rather than mathematical algorithms," said Chris Shipley, executive producer of DEMO 2003. "The ability to constantly exchange encryption keys with absolute security is a huge benefit for security-conscious organizations in government and businesses with high-value intellectual property. I am delighted to have MagiQ unveil its next-generation security system at DEMO, as it's sure to play an active role in protecting our corporate and national IT infrastructures." Today's encryption solutions rely solely on computational difficulty for their security. The assumption is that it would take thousands of years of computer time to decrypt these messages using brute-force or various decryption algorithms. However, as computing power continues its dramatic rise, and new algorithms are developed, today's secrets could become vulnerable in the future - presenting major threats to countries' national security, corporations' intellectual property and confidential information in general. QKD is designed to provide security assurance for the long term, since it relies not on ever-changing computational difficulty, but on the fixed principles of physics. The Navajo QKD system cannot be cracked using mathematical algorithms or brute-force attacks. MagiQ Technologies Inc.

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
LRTV Huawei Video Resource Center
Interview With Rick Talbot, Principal Analyst, Current Analysis

10|31|14   |   2:12   |   (0) comments


At the NFV Open Cloud Forum 2014, Rick Talbot shared his positive feedback about the holistic and open approach that Huawei adopts for SDN and NFV. He also found the open sharing at the event valuable as it features different perspectives from Huawei experts, telecom operators, industry analysts as well as security experts.
LRTV Huawei Video Resource Center
Interview With David Snow, Principal Analyst, Current Analysis

10|31|14   |   2:24   |   (0) comments


David Snow talked about his understanding of Huawei and its SoftCOM strategy at the NFV Open Cloud Forum 2014, saying that Huawei's wide approach combining IT and CT expertise, introducing big data and analytics into solutions and contributing to the OpenStack community particularly resonate with him and make the company stand out in the industry.
LRTV Huawei Video Resource Center
Interview With Roz Roseboro, Senior Analyst, Heavy Reading

10|31|14   |   3:13   |   (0) comments


Roz Roseboro commented on Huawei's data center capabilities and NFV solutions at the NFV Open Cloud Forum 2014, saying that in addition to covering all three key domains of compute, storage and networking, the company also emphasizes the importance of management capabilities and professional services, which are essential in making NFV a reality.
LRTV Huawei Video Resource Center
Interview With Michael Howard, Co-founder & Principal Analyst, Infonetics Research

10|31|14   |   5:25   |   (0) comments


Michael Howard talked about SDN, NFV, and OpenStack adoption at Huawei's NFV Open Cloud Forum 2014. Particularly, he pointed out that Virtual Enterprise CPE is the top NFV use case that operators plan to invest in over 2014 and 2015 to deliver new enterprise services through virtualized functions.
LRTV Huawei Video Resource Center
Interview With Jerry Caron, Senior Vice President, Current Analysis

10|31|14   |   3:11   |   (0) comments


At Huawei's NFV Open Cloud Forum 2014, Jerry Caron from Current Analysis said that orchestration and management are key to realizing SDN and NFV for global carriers, and the approach that Huawei is taking, with its FusionSphere Cloud OS at the core, is in the right direction to address the challenges.
LRTV Documentaries
Broadband Battles

10|31|14   |   01:39   |   (0) comments


This year's Broadband World Forum featured a number of show floor battles focused on access gear, components and coffee.
Jonestown
Mobile Backhaul: Going to the Dark Side?

10|30|14   |   2:26   |   (1) comment


Heavy Reading's Patrick Donegan shares his view on a dark trend that bubbled up at Light Reading's annual backhaul conference in NYC.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With CEO of SwitchCom

10|30|14   |   4:13   |   (0) comments


SwitchCom, an IT company based in Angola, recommends a variety of Huawei solutions and hardware to their customers in the energy industry.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Ethiopia's Ministry of Water Irrigation & Energy

10|30|14   |   4:08   |   (0) comments


Gosaye Mengistie of Ethiopia's Ministry of Water Irrigation & Energy discusses the collaboration with Huawei in that country.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Dongfang Electronics Corporation

10|30|14   |   5:46   |   (0) comments


Dongfang Electronics Corporation, headquartered in Chengdu, China, is one of China's largest manufacturers of power generators and contractors of power station projects.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Zimbabwe's Customers

10|30|14   |   3:31   |   (0) comments


Representatives of Zimbabwe's Ministry of Power and Development discuss the energy needs of their country as well as new areas of improvement due to enhanced ICT capabilities.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Colbún Chile

10|30|14   |   4:29   |   (0) comments


In Chile, an aging energy infrastructure was in dire need of a modern update. Claudio Valenzuela of Colbún discusses how Huawei's ICT solutions continue to provide crucial information to improve the grid and how an in-country engineer is a cricial asset.
Upcoming Live Events
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
February 10, 2015, Atlanta, GA
May 6, 2015, McCormick Convention Center, Chicago, IL
May 30, 2015, The Westin Peachtree, Atlanta, GA
June 9-10, 2015, Chicago, IL
Infographics
WhoIsHostingThis.com presents six of the world's most extreme WiFi hotspots, enabling the most epic selfies you can imagine.
Hot Topics
Microsoft's Skype Embraces WebRTC on IE
Sarah Reedy, Senior Editor, 10/27/2014
FTC Slaps AT&T With Throttling Lawsuit
Sarah Reedy, Senior Editor, 10/28/2014
Wheeler Gets Down With OTT
Mari Silbey, Independent Technology Editor, 10/29/2014
China's MVNOs Hit the Wall
Robert Clark, 10/27/2014
Let's Not Kill SDN & NFV With Silos
Francois Locoh-Donou, Senior VP, Global Products Group, Ciena, 10/28/2014
Like Us on Facebook
Twitter Feed