Cambridge Quantum Random Key Generation and Encryption

Cambridge Quantum Computing has a demo of its quantum key security generation at Ironbridgeapi.com.

Above is a picture of a quantum random key generation device

IronBridge is the world’s first commercially available certifiable Quantum Cryptographic Device.

IronBridge addresses major security challenges and vulnerabilities in today’s infrastructure and has important structural implications for cybersecurity and quantum cryptography on a global scale. This practical solution allows governments and businesses around the world to attain unparalleled levels of quantum-enhanced encryption and security relating to much of the technology that underpins daily digital interactions including IoT, big data, cloud infrastructure, networks and communications. By slotting neatly into existing network configurations, IronBridge provides a solution that works today whilst simultaneously protecting against the threats of tomorrow.

IronBridge will be commercially available in limited quantities from mid-2019 with a full-scale launch by the end of 2019. The launch will include cloud delivery of a variety of quantum-safe cryptographic applications including RSA compliant certificates, AES tokens, as well as un-hackable protocols for everyday digital interactions that involve encryption procedures that depend upon Single Key Session (“SKS”) interactions and critical dependency on computationally “lite” sensors such as those in autonomous vehicles and drones. Other applications, including maximally random entropy for sophisticated Monte Carlo simulations and securing blockchain development, will also be available.

6 thoughts on “Cambridge Quantum Random Key Generation and Encryption”

  1. As Brett Bellmore correctly said, random number generators have been used in cryptography for many decades. They create random values which are used as the encryption and decryption key, based on the behavior of physical systems behaving randomly (such as led outputs, analogue transistor frequency outputs, natural radio spectrum spikes, unpredictable radioactive decay, etc.). The separation of public form private key is another form of cryptography known as asymmetric cryptography.

  2. That’s a bit more detail than given above, and goes quite a bit beyond “quantum random key generation device” .

  3. After working in IT for the last 15 years I can definitely tell you we need far better security, and easier to implement and maintain, than we have now. This is especially critical for our defense industries, but protection from economic espionage is important as well. Phishing campaigns will still likely be an issue though, which is one of the most common attacks we faced. They are difficult to be proactive about without cutting off legitimate communications outside the network.

  4. Quantum computers can break your ‘random number key’ in less than a second either over land lines or over air.
    Hence, how do you protect computers once traditional keys can be broken quasi instantaneously:
    Answer quantum computer cryptography. It manipulates physical photons before sending them.
    How?
    It does not communicate how to unscramble the message (no traditional key) and the message is read out randomly by randomly switching between filters. The sender on the other hand, precisely registers which filters he uses to change the sent photon and remembers it in a file (which is not sent with the message). Hence eavesdroppers ) which do not know the random order in which the receiver read the message, only have a random string of bits and do not know what ‘manipulation’ has been performed on it.

    The receiver also performs a random operation on the message by randomly passing each bit to a filter. (he records the precise order in a file)

    After the message is received (hence easdropping does not help) the receiver informs the sender, by sending the settings-file, what settings he used for each photon. The sender returns that receiver used ‘wrong’ or ‘right’ setting without detailing which one it was (eavesdropper does not find out).

    Now the receiver knows which photons were read out correctly or not.
    The wrong bits are discarded as meaningless. The remaining bits are the message.

    There is no way for an eavesdropper to crack this information.

  5. People have been generating random numbers using quantum physics since, well, the 60’s as far as I’m personally aware of. A properly biased diode and some logic is all it takes.

    What makes this one special? Blue LED lighting?

Comments are closed.