Language Selection

English French German Italian Portuguese Spanish

Quantum leap in secure web video

Filed under
Hardware

Scientists at its Cambridge UK labs successfully demonstrated its Quantum Key Server system, which refreshes keys without interruption, on video.

Simply put, quantum cryptography involves encoding bits of encryption data onto particles of light - photons.

It is an emerging technology which is set to revolutionise digital security.

Current distribution methods for keys, which are needed to decrypt secure messages, are not as secure.

When data and files need to be encrypted, or made unreadable and therefore secure from prying eyes, long numeric keys - in ones and zeros - are used to scramble the data.

The intended recipient is able to descramble or unlock the data using another set of numbers - the key.

Applications using secure quantum cryptographic techniques are about three years away, according to Toshiba's Dr Andrew Shields, who leads the development group.

Toshiba's breakthrough showed that each frame in a video file could be encrypted using separate keys, which means that cracking one frame of a video - already difficult - would be useless unless all the other frames were cracked too.

"The key innovation has been to make the system work continuously," Dr Shields explained to the BBC News website.

"This is important if you want to stream data like video. We can send keys, and just by looking at them can tell if someone has read them en route," he said.

The laws of quantum physics guarantee that the properties of the photon changes if anyone intercepts it and tries to read the information from it.

"Imagine if you received a letter, you opened that letter and read it, there is no way of telling if someone has read that letter en route.
"When you encode the information on single particles, the letter self destructs whenever someone else reads it.

"I sometimes say it is like the messages in Mission Impossible. If anyone tries to read the messages, they self destruct," said Dr Shields.

The self-managing system can operate 24 hours a day, seven days a week.

It could be extended to securely encrypt other data files which require high bandwidth, like sensitive legal documents, tax records or medical histories, added Dr Shields.

It could also be used to provide an ultra-secure link between separate corporate sites allowing for extremely secure file transfers over fibre optic networks.

Company computer networks, where the technology will first be used, are increasingly vulnerable to the theft of keys from desktop machines.

Often this is through hacking attempts, Trojan programs deposited on computers, or fraudulent employees.

Toshiba's Quantum Key Server technology would make key theft futile because it allows frequent key refreshing.

Quantum encryption will eventually give companies a "once and for all" security system, said Dr Shields.

Full Story.

More in Tux Machines

OSS in the Back End

  • Open Source NFV Part Four: Open Source MANO
    Defined in ETSI ISG NFV architecture, MANO (Management and Network Orchestration) is a layer — a combination of multiple functional entities — that manages and orchestrates the cloud infrastructure, resources and services. It is comprised of, mainly, three different entities — NFV Orchestrator, VNF Manager and Virtual Infrastructure Manager (VIM). The figure below highlights the MANO part of the ETSI NFV architecture.
  • After the hype: Where containers make sense for IT organizations
    Container software and its related technologies are on fire, winning the hearts and minds of thousands of developers and catching the attention of hundreds of enterprises, as evidenced by the huge number of attendees at this week’s DockerCon 2016 event. The big tech companies are going all in. Google, IBM, Microsoft and many others were out in full force at DockerCon, scrambling to demonstrate how they’re investing in and supporting containers. Recent surveys indicate that container adoption is surging, with legions of users reporting they’re ready to take the next step and move from testing to production. Such is the popularity of containers that SiliconANGLE founder and theCUBE host John Furrier was prompted to proclaim that, thanks to containers, “DevOps is now mainstream.” That will change the game for those who invest in containers while causing “a world of hurt” for those who have yet to adapt, Furrier said.
  • Is Apstra SDN? Same idea, different angle
    The company’s product, called Apstra Operating System (AOS), takes policies based on the enterprise’s intent and automatically translates them into settings on network devices from multiple vendors. When the IT department wants to add a new component to the data center, AOS is designed to figure out what needed changes would flow from that addition and carry them out. The distributed OS is vendor-agnostic. It will work with devices from Cisco Systems, Hewlett Packard Enterprise, Juniper Networks, Cumulus Networks, the Open Compute Project and others.
  • MapR Launches New Partner Program for Open Source Data Analytics
    Converged data vendor MapR has launched a new global partner program for resellers and distributors to leverage the company's integrated data storage, processing and analytics platform.
  • A Seamless Monitoring System for Apache Mesos Clusters
  • All Marathons Need a Runner. Introducing Pheidippides
    Activision Publishing, a computer games publisher, uses a Mesos-based platform to manage vast quantities of data collected from players to automate much of the gameplay behavior. To address a critical configuration management problem, James Humphrey and John Dennison built a rather elegant solution that puts all configurations in a single place, and named it Pheidippides.
  • New Tools and Techniques for Managing and Monitoring Mesos
    The platform includes a large number of tools including Logstash, Elasticsearch, InfluxDB, and Kibana.
  • BlueData Can Run Hadoop on AWS, Leave Data on Premises
    We've been watching the Big Data space pick up momentum this year, and Big Data as a Service is one of the most interesting new branches of this trend to follow. In a new development in this space, BlueData, provider of a leading Big-Data-as-a-Service software platform, has announced that the enterprise edition of its BlueData EPIC software will run on Amazon Web Services (AWS) and other public clouds. Essentially, users can now run their cloud and computing applications and services in an Amazon Web Services (AWS) instance while keeping data on-premises, which is required for some companies in the European Union.

today's howtos

Industrial SBC builds on Raspberry Pi Compute Module

On Kickstarter, a “MyPi” industrial SBC using the RPi Compute Module offers a mini-PCIe slot, serial port, wide-range power, and modular expansion. You might wonder why in 2016 someone would introduce a sandwich-style single board computer built around the aging, ARM11 based COM version of the original Raspberry Pi, the Raspberry Pi Compute Module. First off, there are still plenty of industrial applications that don’t need much CPU horsepower, and second, the Compute Module is still the only COM based on Raspberry Pi hardware, although the cheaper, somewhat COM-like Raspberry Pi Zero, which has the same 700MHz processor, comes close. Read more

DAISY: A Linux-compatible text format for the visually impaired

If you're blind or visually impaired like I am, you usually require various levels of hardware or software to do things that people who can see take for granted. One among these is specialized formats for reading print books: Braille (if you know how to read it) or specialized text formats such as DAISY. Read more