iXBT Labs - Computer Hardware in Detail






Latest News

 « Previous Day News Archive  

Quantum Encryption Networks Successfully Interconnected For First Time

Mitsubishi Electric, NEC, and Institute of Industrial Science, University of Tokyo have successfully interconnected quantum cryptography systems developed by Mitsubishi Electric and NEC, the first time such an experiment has been successful in Japan. The Institute of Industrial Science at University of Tokyo evaluated the system's security. Quantum cryptography guarantees absolute security, underwritten by the laws of quantum physics.

This achievement was the result of modifying different quantum encryption systems developed by NEC and Mitsubishi Electric, which were researched and developed under a quantum encryption technology project sponsored by the National Institute of Information and Communication (NICT), Research and Development on Quantum Cryptography, from 2001 to 2005.

Security of most modern cryptography is based on computational complexity, and the extraordinary time necessary for cryptanalysis. It has been pointed out that modern cryptography may be threatened by the increasing speed and ability of computers in the future. To that end, many are suggesting a shift to using quantum encryption. This type of optical cryptography uses quantum-state photons to carry data, and has the advantage of being able to detect eavesdropping. This results in a physically unbreakable, ultimate code. However, since there has been no standardization in the details of the encryption algorithms or the construction of optical devices necessary in communication, it has not been possible to interconnect different systems or build a communication network between different users. They have now developed a technology that can interconnect Mitsubishi Electric and NEC's cryptography systems. This was done on a NICT-developed JGN2 test bed network at the Akihabara access point. Results verify the potential for their system to be the foundation for the next generation of secure networks.

Firstly, they developed a new interface and shared encryption key, and confirmed mutual communication between the differing quantum cryptography systems developed by Mitsubishi Electric and NEC. This is a key technology in standardization of quantum cryptography systems, and will allow for a highly confidential communication network in the future.

Secondly, previously it was necessary to receive objective third party safety certification for the various systems that Mitsubishi Electric and NEC developed separately. This time the scientists conducted an observation experiment of information leaked by eavesdropping as well as weaknesses born from implementation, and both verified and confirmed the security of the interconnected quantum cryptography system.

The chart below represents an interconnected quantum encryption network made of Mitsubishi Electric (Device A, B) and NEC (Device C, D) quantum encryption systems. In the past, each system was constructed independently, and communication was done in a closed system. A way of relaying information was necessary in order to network the different systems. With this experiment, they were able to successfully interconnect a quantum encryption network without any affects on the different systems by developing a new relay method. The security of the network underwent a theoretical observation study at Tokyo University's Institute of Industrial Science.

Process for a shared key in a quantum encryption network: First set and apply an appropriate key to the various communications between devices A,B,C and D. Devices A and B will share the key K1, and devices C and D will share the key K2. Next, the key that should eventually be shared by Devices A and D should be produced at the center, and should be sent to Devices A and D passing through Devices B and C. Key K1 encrypted Key K3 will be sent to Device A from Device B, and key K2 encrypted key K3 will be sent to Device D from Device C. Devices A and D will decipher those and get key K3. Using the above procedure, devices A and D can, based on quantum encryption theory, safely share key K3. Using key K3 as an encryption key, Device A and Device D can safely share data.

It is hoped that using this technology it will be possible to realize quantum cryptographic networks within 5 years.

Source: NEC

 « Previous Day News Archive  

Latest headlines

ASUS Launches R9 200, R7 200 Series, Matrix R9 280X Graphics Cards

Apacer Launches SATA SLC-lite SSD solutions

ADATA Introduces a Stylish External HDD HC630

Samsung Introduces New Wireless Multiroom Speakers

WD Gives Consumers a Cloud of Their Own

Write a comment below. No registration needed!

blog comments powered by Disqus

  Most Popular Reviews More    RSS  

AMD Phenom II X4 955, Phenom II X4 960T, Phenom II X6 1075T, and Intel Pentium G2120, Core i3-3220, Core i5-3330 Processors

Comparing old, cheap solutions from AMD with new, budget offerings from Intel.
February 1, 2013 · Processor Roundups

Inno3D GeForce GTX 670 iChill, Inno3D GeForce GTX 660 Ti Graphics Cards

A couple of mid-range adapters with original cooling systems.
January 30, 2013 · Video cards: NVIDIA GPUs

Creative Sound Blaster X-Fi Surround 5.1

An external X-Fi solution in tests.
September 9, 2008 · Sound Cards

AMD FX-8350 Processor

The first worthwhile Piledriver CPU.
September 11, 2012 · Processors: AMD

Consumed Power, Energy Consumption: Ivy Bridge vs. Sandy Bridge

Trying out the new method.
September 18, 2012 · Processors: Intel
  Latest Reviews More    RSS  

i3DSpeed, September 2013

Retested all graphics cards with the new drivers.
Oct 18, 2013 · 3Digests

i3DSpeed, August 2013

Added new benchmarks: BioShock Infinite and Metro: Last Light.
Sep 06, 2013 · 3Digests

i3DSpeed, July 2013

Added the test results of NVIDIA GeForce GTX 760 and AMD Radeon HD 7730.
Aug 05, 2013 · 3Digests

Gainward GeForce GTX 650 Ti BOOST 2GB Golden Sample Graphics Card

An excellent hybrid of GeForce GTX 650 Ti and GeForce GTX 660.
Jun 24, 2013 · Video cards: NVIDIA GPUs

i3DSpeed, May 2013

Added the test results of NVIDIA GeForce GTX 770/780.
Jun 03, 2013 · 3Digests
  Latest News More    RSS  

Platform  ·  Video  ·  Multimedia  ·  Mobile  ·  Other  ||  About us & Privacy policy  ·  Twitter  ·  Facebook

Copyright © Byrds Research & Publishing, Ltd., 1997–2011. All rights reserved.