LT   EN   RU  
Saturday 13 July 2024 - Independent and informative portal
Register   Login
News subscribe
Subscribe   Unsubscribe
Visits since 2002 09 12 - 70788533
Pages in 40735
  Computers > Computer technologies > Hackers
Lankomumo reitingas Print version Print version
Toshiba puts quantum crypto into practice

The system, which has run continuously since it was set in motion last week, relies on single photons to transmit an untappable key over standard optical fibers, the company said. It is capable of delivering thousands of keys a second and can be effective over distances of more than 100 kilometers.

Toshiba said it is already in talks with a number of telecommunications companies and end users in preparation for the commercialization of the technology, which offers the possibility of significantly more secure networking.

"We're talking to a number of potential end users at the minute," said Andrew Shields, group leader of Toshiba's Cambridge, England-based Quantum Information Group. "We're planning to do some trials in the city of London next year and are targeting users in the financial sector. We've also had some interest from telcos, including MCI, with whom we've been running the installed fiber tests."

No price or launch date has been set yet, Toshiba said.

The system works by transmitting a long stream of photons modulated to represent 1s and 0s, most of which are lost along the way. These photons can be modulated in one of two ways, through two different kinds of polarization. According to Heisenberg's Uncertainty Principle, however, it is impossible to know both the kind of polarization and the data represented by the photon. The receiver has to assume one to get the other, which it will frequently get wrong.

The receiver picks up and attempts to decode a few out of those that make it, reporting back to the sender which ones it received and decoded, thus making up a key that both ends know. Any interceptor can't know what the value of those photons is, because by reading them in transit, it will destroy them. It can't replace them after reading them, because it can never know their exact details.

Toshiba has been developing special hardware to create and analyze single-photon transactions by quantum dots - effectively artificial atoms integrated with control circuitry. However, the current cryptographic equipment uses standard parts, including Peltier effect-cooled detectors operating at very low noise levels. The next generation of equipment is expected to use this new technology.

Toshiba is also looking at ways to increase the range of the systems beyond the limitations of a single fiber. Because a photon can't be intercepted and retransmitted, it's not possible for the technology to incorporate repeaters to overcome the losses in multiple segments. However, Shields said, there is a possibility that repeaters may be created using quantum teleportation - a new and still experimental effect where the quantum state of a particle can be transmitted across distances without it needing to be fully measured.

Toshiba Research Europe is part of the European SECOQC project, which is working toward the development of a global network for secure communication using quantum technology.

Lankomumo reitingas

Diskusijos - Discusions

Versija spausdinimui - Print version


Random tags:    Guns (11)    Medicine (5)    Casino’s (10)    Hackers (59)    Architecture (2)    Formula 1 (2)    Love (48)    Sport gymnastics (9)    Philosophy (2)    Wedding (10)    Programing (13)    Feng Shui (14)    Science (163)    Modems (2)    Hunting (3)    Sport (81)    Communication (38)    Pedagogics (10)    Law (11)    Countries (43)    Health (20)    Linux/Unix (2)    Geography (10)    Religion (34)    Beer (10)    Music (10)    Aviation (10)    Chess (10)    Cats (14)    Astronomy (11)    Agrobusiness (2)    Hardware (43)    Scaners (10)    Software (11)    Cryptography (10)    Computers (355)    Laptops (10)    Politics (13)    Cinema (20)    Travels (2)    Tourism (46)    Badminton (3)    Motorcycles (33)    Fishing (14)    Mysticism 2 (3)    S.Valiulis (2)    Mysticism (119)    Photography (3)    Dragons (13)    Automobiles (10)
1. Bill Gates and other communists
2. Wi-Fi overtakes Ethernet for home networks
3. Worm plays games with victims
4. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
5. iWork productivity software targets Microsoft's Office
6. Troy-horses infects Windows Media files?
7. Taiwan police seize 60,000 suspect AMD CPUs
8. IDC: 3 future technologies
9. Windows XP SP2 Firewall shows your files and printers to every Internet user
10. phpBB Attachment Mod: new vulnerabilities discovered
1. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
2. Who says safe computing must remain a pipe dream?
3. Taiwan police seize 60,000 suspect AMD CPUs
4. Bill Gates and other communists
5. phpBB Attachment Mod: new vulnerabilities discovered
6. iWork productivity software targets Microsoft's Office
7. Feds try to take logs from Nmap creator
8. New hacking tool: chocolate
9. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
10. New Internet domains in the works