CSSE 板


LINE

Quantum encryption enters product phase R. Colin Johnson EE Times (04/28/2005 2:01 H EDT) PORTLAND, Ore. — Network security systems that rely on the laws of quantum mechanics to create hack-proof networks are arriving in the form of practical products that are easily integrated into optical networks. At the Infosecurity Europe 2005 trade show in London, id Quantique SA (Geneva) announced a turnkey quantum encryption system enabling hack-proof secure bridges between two Fast Ethernet (IEEE 802.3u) networks up to 100 kilometers apart. The move followed a March announcement by MagiQ Technologies Inc. (New York), which rolled a rework of its Quantum Private Network (QPN) 5505 system. The QPN 7505 incorporates Cavium Networks' Nitrox data encryption processors. The id Quantique product is "the first quantum cryptography system designed for network engineers and not for physicists," said CEO Gregoire Ribordy. For its part, MagiQ wanted to introduce quantum encryption systems that would be easy for network designers to implement while improving the cost/performance ratio of the systems. "During trials and deployment of our QPN 5505, we received some excellent feedback from our enterprise and classified installations that helped us improve the speed, usability and integration ease of the product," CEO Bob Gelfond of MagiQ said in a prepared statement. The revamped system produces and distributes public keys in real-time. Use of the Nitrox encryption processors makes it possible to implement a virtual private network using standard IPsec protocols and an unhackable key distribution system, according to the company. MagiQ has also introduced a quantum encryption test bed so network engineers can implement their own designs based on quantum crypto. Whereas conventional crypto methods are only as good as the length of their key, quantum encryption eliminates the possibility of eavesdropping. In the conventional methods, a 56-bit key (or a 256-bit key in the case of the Advanced Encryption Standard) scrambles data with a one-way function (such as, "Multiply two large prime numbers"). Encryption is a simple operation for a computer, but going backward (such as from a large number to finding its prime factors) is very difficult for computers unless you have the key. Secret keys for one-time functions let only the receiver decrypt the scrambled bits, but in practice even the most secret key can be found by a supercomputer using trial and error. In contrast, quantum cryptography is secure no matter how fast a hacker's computer is because the technique harnesses the laws of physics to guarantee security. In quantum crypto, different quantum states (such as polarization) of individual photons are used to represent ones and zeroes with a specified probability distribution. A hacker who tapped into an encrypted photon would alter that distribution, alerting the receiver that an observation of the key had taken place. Quantum-key distribution (QKD) offers a level of security that would not be possible for AES unless a new AES key, of the same length as the data to be transmitted, were made for each transmission. In late 2002, id Quantique demonstrated its version of QKD over standard optical fibers installed between Geneva and Lausanne, Switzerland — a 70-km distance (see www.eetimes.com/story/OEG20021111S0036). In 2003, MagiQ announced commercial availability of its quantum key distribution and encryption system, the Navajo Security Gateway, which offered unbreakable encryption over existing fiber-optic lines (see www.eetimes.com/showArticle.jhtml?articleID=18310030). Also in 2003, the World Internet Secure Key SA and the International Organization for the Security of Electronic Transactions pledged to create the infrastructure necessary for worldwide distribution of unbreakable quantum keys in cooperation with id Quantique (see www.eetimes.com/story/OEG20031020S0025). And in July 2004, MagiQ introduced the QPN 5505 in Glasgow, Scotland, at the Seventh International Conference on Quantum Communication. The company also announced the successful transmission of a single photon over a secure channel 75 kilometers long, which the company claimed was a record at the time. MagiQ designed its QPN architecture as an embedded system running on either the Windows or Linux operating systems. The embedded system generates and stores quantum keys, which are sent over a separate fiber channel. The embedded-key-generation system runs continuously, providing a real-time level of security. Keys that encrypt information on a standard optical fiber channel are refreshed every second. For its part, id Quantique took the route of developing a turnkey system for connecting Fast Ethernet networks. Called the Vectis Link Encryptor, the complete network-transparent cryptographic solution lets network engineers quickly bridge remote Ethernet networks with a hack-proof connection. "This new cryptographic appliance combines ease of integration into existing networks and uncompromised security. It will allow us to target the most demanding security applications. Potential customers include financial services, service providers, R&D companies, government agencies and others," said Ribordy. Vectis provides point-to-point wire-speed link encryption that combines QKD and AES encryption with new keys refreshed up to 100 times per second. The Layer 2 network transparent encryption device securely bridges two Fast Ethernet (IEEE 802.3u) networks with all the quantum functions completely automated and monitored by a built-in surveillance unit that detects eavesdropping attempts. The overhead for encryption and decryption results in sub-millisecond latency, according to Ribordy, making the system compatible with time-critical communications such as voice-over-Internet Protocol. A user-friendly touchpanel display interface reads out the tamper-detection system's results and offers pushbutton access to the Simple Network Management Protocol. The company already claims customers for its quantum encryption systems in the United States, Canada, Europe, Asia, Latin America and the Middle East. Id Quantique is a spin-off from the University of Geneva and participates in both European quantum communications efforts — RamboQ and Secoqc. — Chappell Brown contributed to this report. http://www.eetimes.com/news/latest/showArticle.jhtml?articleID=161601149 --



※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 61.222.173.29
1F:推 ogre0403:請問 EE Times 是電子報嗎 要去那訂閱阿 203.187.78.1 05/08
2F:→ ogre0403:抱歉 問了一個不太相關的問題 203.187.78.1 05/08
※ 編輯: reader 來自: 61.222.173.29 (05/08 17:04)
3F:推 reader:忘記附網址 已補上 61.222.173.29 05/08
4F:推 reader:EE Times 有發行電子報 免費訂閱 61.222.173.29 05/08
5F:推 obov:哇.....太厲害了 218.167.168.82 05/08
6F:推 autrijus:http://0rz.net/2e0mM 有不錯的解釋220.132.132.105 05/14







like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草

請輸入看板名稱,例如:Gossiping站內搜尋

TOP