& cplSiteName &

MagiQ Demos Quantum Cryptography

Light Reading
News Wire Feed
Light Reading

SCOTTSDALE, Ariz. & NEW YORK -- MagiQ Technologies, Inc., (www.magiqtech.com) the quantum information processing (QIP) company, today unveiled the first commercial quantum cryptography system at DEMO 2003. The successful demonstration of Navajo, MagiQ's Quantum Key Distribution (QKD) system, is the first ever public display of a working, commercially-viable quantum cryptography system. By encoding information and placing single photons into quantum superposition, Navajo delivers secure, unbreakable and future-proof key distribution at unprecedented speeds that easily integrates into organizations' existing technology infrastructures. MagiQ today also officially announced the Navajo beta program, which currently includes ten sites within financial institutions, businesses and service providers across the United States. For additional information on the program or to become a beta site, please visit http://www.magiqtech.com/about/navajo.php. "We are honored to have been selected to publicly demonstrate Navajo for the first time ever to the attendees of DEMO 2003," said Bob Gelfond, founder and CEO of MagiQ. "We've been focused on taking the huge business benefits that have been promised by QKD in the lab, most notably unbreakable key distribution, and integrating the technology with the customer requirements that our beta sites have dictated. As the attendees of the event have seen, the result is an affordable solution that applies the principles and associated benefits of quantum cryptography with the requirements for the solution to be as plug and play as possible into organizations' existing IT infrastructures." The fundamental part of any cryptographic protocol is the encryption key - a string of random bits that are used to encode the data to be communicated between the parties. Exchanging this key with absolute certainty that it has not been "overheard" is a challenging task, and the solution to this problem lies in QKD. The security of quantum cryptography lies in its ability to exchange the encryption key with absolute security. By encoding the encryption key photon by photon and having more than one piece of information on each photon, quantum mechanics guarantees that the act of an eavesdropper intercepting a photon, even just to observe or read, irretrievably changes that photon. Therefore, the eavesdropper can neither copy nor clone a photon nor read more than one piece of information without destroying the other piece. This arises from Heisenberg's Uncertainty Principle: an eavesdropper listening in on the key distribution channel will necessarily leave traces -- and the more information the eavesdropper obtains, the greater the detectable disturbances. Consequently, the communicating parties can use part of their key to determine the presence of an eavesdropper and only use the key if appropriate. The use of continuous symmetrical quantum key regeneration and truly random numbers makes the data encryption absolutely secure. "MagiQ's Quantum Key Distribution system is at the forefront of new security technologies and provides unbreakable security, based on the laws of physics rather than mathematical algorithms," said Chris Shipley, executive producer of DEMO 2003. "The ability to constantly exchange encryption keys with absolute security is a huge benefit for security-conscious organizations in government and businesses with high-value intellectual property. I am delighted to have MagiQ unveil its next-generation security system at DEMO, as it's sure to play an active role in protecting our corporate and national IT infrastructures." Today's encryption solutions rely solely on computational difficulty for their security. The assumption is that it would take thousands of years of computer time to decrypt these messages using brute-force or various decryption algorithms. However, as computing power continues its dramatic rise, and new algorithms are developed, today's secrets could become vulnerable in the future - presenting major threats to countries' national security, corporations' intellectual property and confidential information in general. QKD is designed to provide security assurance for the long term, since it relies not on ever-changing computational difficulty, but on the fixed principles of physics. The Navajo QKD system cannot be cracked using mathematical algorithms or brute-force attacks. MagiQ Technologies Inc.

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Featured Video
From The Founder
Light Reading founder Steve Saunders recently visited the University of North Carolina Charlotte (UNCC) where Cisco's Tetration application is providing data center analytics, simplifying SDN, helping with cloud migration and overseeing white-list security policy.
Flash Poll
Upcoming Live Events
March 20-22, 2018, Denver Marriott Tech Center
March 22, 2018, Denver, Colorado | Denver Marriott Tech Center
March 28, 2018, Kansas City Convention Center
April 4, 2018, The Westin Dallas Downtown, Dallas
April 9, 2018, Las Vegas Convention Center
May 14-16, 2018, Austin Convention Center
May 14, 2018, Brazos Hall, Austin, Texas
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
AT&T Likens DoJ Suit to Shaved Persian Cat
Mari Silbey, Senior Editor, Cable/Video, 3/12/2018
Trump Blocks Broadcom's Qualcomm Acquisition
Dan Jones, Mobile Editor, 3/12/2018
Rumor Mill: SoftBank Still Eyeing Charter
Mari Silbey, Senior Editor, Cable/Video, 3/12/2018
Eurobites: BT Hires Sherman as Strategy Tank
Paul Rainford, Assistant Editor, Europe, 3/14/2018
Animals with Phones
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed