50 likes | 194 Views
QKD. www.magiqtech.com Totally secure key distribution Faster key refresh rate (up to once per second) Proactive, absolute intrusion detection Lower total cost of ownership. http://cryptome.org/qc-grover.htm.
E N D
QKD • www.magiqtech.com • Totally secure key distribution • Faster key refresh rate (up to once per second) • Proactive, absolute intrusion detection • Lower total cost of ownership
Quantum cryptography is a new technology that gives a solution to the key distribution and key management problems. The keys generated and disseminated using quantum cryptography are proven to be absolutely random and secure. The security of quantum cryptography is based upon the laws of quantum mechanics, not upon the assumed security of complex mathematical algorithms. Thus, progress in computational power, advances in hardware design, or the discovery of new mathematical algorithms will not compromise the security provided by systems using these technologies. Quantum cryptography is also safe with respect to future advances in code breaking and computing, including developments in the new field of quantum computing, which will severely reduce or possibly obliterate the security of classical cryptographic solutions.
CRYPTO-GRAM May 15, 2000 • There's some news on the quantum cryptography front. I was not going to • even bother mentioning this, but I have received enough press calls to • indicate that most people don't understand the ramifications. As a • scientist, I find this interesting. As a security professional, I know • it's irrelevant. Elsewhere I've described a reliance on cryptography as • putting a tall spike in the ground and hoping the enemy runs right into • it. The real problems are not crypto-related: they're implementation • errors, trust-model screw-ups, intentional misuse, misconfiguration, • etc. Quantum cryptography is an interesting development, but it's akin to • arguing whether the spike is one mile tall or 1.5 miles tall. (For anyone • who's wondering what quantum cryptography is, there's a lucid explanation • in the last chapter of Simon Singh's _The Code Book_.) Much more useful is • to start worrying about all the non-crypto-related vulnerabilities. • <http://www.aip.org/releases/2000/release03.html>