Language Selection

English French German Italian Portuguese Spanish

Quantum leap in secure web video

Filed under
Hardware

Scientists at its Cambridge UK labs successfully demonstrated its Quantum Key Server system, which refreshes keys without interruption, on video.

Simply put, quantum cryptography involves encoding bits of encryption data onto particles of light - photons.

It is an emerging technology which is set to revolutionise digital security.

Current distribution methods for keys, which are needed to decrypt secure messages, are not as secure.

When data and files need to be encrypted, or made unreadable and therefore secure from prying eyes, long numeric keys - in ones and zeros - are used to scramble the data.

The intended recipient is able to descramble or unlock the data using another set of numbers - the key.

Applications using secure quantum cryptographic techniques are about three years away, according to Toshiba's Dr Andrew Shields, who leads the development group.

Toshiba's breakthrough showed that each frame in a video file could be encrypted using separate keys, which means that cracking one frame of a video - already difficult - would be useless unless all the other frames were cracked too.

"The key innovation has been to make the system work continuously," Dr Shields explained to the BBC News website.

"This is important if you want to stream data like video. We can send keys, and just by looking at them can tell if someone has read them en route," he said.

The laws of quantum physics guarantee that the properties of the photon changes if anyone intercepts it and tries to read the information from it.

"Imagine if you received a letter, you opened that letter and read it, there is no way of telling if someone has read that letter en route.
"When you encode the information on single particles, the letter self destructs whenever someone else reads it.

"I sometimes say it is like the messages in Mission Impossible. If anyone tries to read the messages, they self destruct," said Dr Shields.

The self-managing system can operate 24 hours a day, seven days a week.

It could be extended to securely encrypt other data files which require high bandwidth, like sensitive legal documents, tax records or medical histories, added Dr Shields.

It could also be used to provide an ultra-secure link between separate corporate sites allowing for extremely secure file transfers over fibre optic networks.

Company computer networks, where the technology will first be used, are increasingly vulnerable to the theft of keys from desktop machines.

Often this is through hacking attempts, Trojan programs deposited on computers, or fraudulent employees.

Toshiba's Quantum Key Server technology would make key theft futile because it allows frequent key refreshing.

Quantum encryption will eventually give companies a "once and for all" security system, said Dr Shields.

Full Story.

More in Tux Machines

Red Hat CTO unexpectedly quits, amid rumors of executive 'friction'

No-one among the rank and file at Red Hat seem to have seen this coming. In a move the Linux giant's staffers said was "shocking" and a "punch in the gut," long-time Red Hat chief technology officer Brian Stevens has resigned. In a short press release, the company announced: "Brian Stevens will step down as CTO." In the same release, Red Hat's president and chief executive Jim Whitehurst said, "We want to thank Brian for his years of service and numerous contributions to Red Hat’s business. We wish him well in his future endeavors." Read more

Is Microsoft engaging in digital imperialism?

Windows, the common carrier of Microsoft, is such a sordid mess that it suffers regular glitches and conducts mass surveillance on users. Microsoft knows that without Windows it cannot survive, so dirty tricks resume in a very big way. This is not a beep on the radar but somewhat of a surge. Nothing is going to change in Munich, but Microsoft is trying to maintain an international/universal perception that the migration to GNU/Linux was a disaster. Numerous anonymous blogs were created to attack Munich over this and provocateurs of Microsoft loved citing them, only to be repeatedly proven wrong. Microsoft is trying to make an example out of Munich in all sorts of nefarious ways. We need to defend Munich from this malicious assault by the convicted monopolist and corrupt enterprise that’s acting as though it fights for its very survival (while indeed laying off tens of thousands of employees). Read more

Shortlist of open source software used at NASA lab

Yes! We use a lot of open source. The short list includes Python, GitHub, Processing, VLC, jQuery, D3.js, Blender, VRUI, ImageJ, VMD, ParaView, MeshLab, VNC, ImageMagick, SWIG, Emacs, and many more. We like using open source because it gives us more flexibility because of licensing and allows us the opportunity to contribute back to the community using our expertise. Our favorite open source project that we work on is OpenMDAO. This project is run out of another Division at our Center. Our team provides some programming support. OpenMDAO is an open source Multidisciplinary Design Analysis and Optimization (MDAO) framework, written in Python. You can use it to develop an integrated analysis and design environment for your engineering challenges. Read more

GSoC: Thumping the Malaria and voyaging in cosmos with KStars

Let's talk about my project now. KStars is desktop planetarium application under KDE Education Projects. I developed QML based cool interface to enable users to browse through image database of community of astrophotographers (i.e. astrobin.com) which contains more than 1,20,000 (number is increasing everyday) real time and very high resolution images along with various information related to them (i.e. Date on which image was captured, Bortle Dark-Sky Scale, RA Centre, DEC Centre, Telescope or Camera used, Description added by astrophotographer etc). I am sure that this browser will enthrall school children by showing them real time images of stars and galaxies located at hundreds of light year far from earth. Read more