Quantum key distribution technology: Secure computing for the ‘Everyman’

17 hours ago by James E. Rickman This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit information between two parties. Quantum key distribution represents a foolproof cryptography method that may now become available to the general public, thanks to a licensing agreement between Los Alamos and Whitewood Encryption Systems, LLC. Los Alamos scientist developed their particular method for quantum cryptography after two decades of rigorous testing inside of the nation's premier national security science laboratory.

The largest information technology agreement ever signed by Los Alamos National Laboratory brings the potential for truly secure data encryption to the marketplace after nearly 20 years of development at the nation's premier national-security science laboratory.

"Quantum systems represent the best hope for truly secure data encryption because they store or transmit information in ways that are unbreakable by conventional cryptographic methods," said Duncan McBranch, Chief Technology Officer at Los Alamos National Laboratory. "This licensing agreement with Whitewood Encryption Systems, Inc. is historic in that it takes our groundbreaking technical work that was developed over two decades into commercial encryption applications."

By harnessing the quantum properties of light for generating random numbers, and creating cryptographic keys with lightning speed, the technology enables a completely new commercial platform for real-time encryption at high data rates. For the first time, ordinary citizens and companies will be able to use cryptographic systems that have only been the subject of experiments in the world's most advanced physics and computing laboratories for real-world applications.

If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer.

The technology at the heart of the agreement is a compact random-number-generation technology that creates cryptographic keys based on the truly random polarization state of light particles known as photons. Because the randomness of photon polarization is based on quantum mechanics, an adversary cannot predict the outcome of this random number generator. This represents a vast improvement over current "random-number" generators that are based on mathematical formulas that can be broken by a computer with sufficient speed and power.

Moreover, any attempt by a third party to eavesdrop on the secure communications between quantum key holders disrupts the quantum system itself, so communication can be aborted and the snooper detected before any data is stolen.

The Los Alamos technology is simple and compact enough that it could be made into a unit comparable to a computer thumb drive or compact data-card reader. Units could be manufactured at extremely low cost, putting them within easy retail range of ordinary electronics consumers.

Whitewood Encryption Systems, Inc. of Boston, Mass., is a wholly owned subsidiary of Allied Minds. The agreement provides exclusive license for several Los Alamos-created quantum-encryption patents in exchange for consideration in the form of licensing fees.

"Whitewood aims to address one of the most difficult problems in securing modern communications: scalabilitymeeting the need for low-cost, low-latency, high-security systems that can effectively service increasingly complex data security needs," said John Serafini, Vice President at Allied Minds. "Whitewood's foundation in quantum mechanics makes it uniquely suited to satisfy demand for the encryption of data both at rest as well as in transit, and in the mass quantity and high-throughput requirements of today's digital environment."

Original post:
Quantum key distribution technology: Secure computing for the 'Everyman'

Microsoft TechNet: Encryption

Traditionally, ciphers have used information contained in secret decoding keys to code and decode messages. The process of coding plaintext to create ciphertext is called encryption and the process of decoding ciphertext to produce the plaintext is called decryption. Modern systems of electronic cryptography use digital keys (bit strings) and mathematical algorithms ( encryption algorithms ) to encrypt and decrypt information.

There are two types of encryption: symmetric key encryption and public (asymmetric) key encryption. Symmetric key and public key encryption are used, often in conjunction, to provide a variety of security functions for network and information security.

Encryption algorithms that use the same key for encrypting and for decrypting information are called symmetric-key algorithms. The symmetric key is also called a secret key because it is kept as a shared secret between the sender and receiver of information. Otherwise, the confidentiality of the encrypted information is compromised. Figure14.1 shows basic symmetric key encryption and decryption.

Figure14.1 Encryption and Decryption with a Symmetric Key

Symmetric key encryption is much faster than public key encryption, often by 100 to 1,000 times. Because public key encryption places a much heavier computational load on computer processors than symmetric key encryption, symmetric key technology is generally used to provide secrecy for the bulk encryption and decryption of information.

Symmetric keys are commonly used by security protocols as session keys for confidential online communications. For example, the Transport Layer Security (TLS) and Internet Protocol security (IPSec) protocols use symmetric session keys with standard encryption algorithms to encrypt and decrypt confidential communications between parties. Different session keys are used for each confidential communication session and session keys are sometimes renewed at specified intervals.

Symmetric keys also are commonly used by technologies that provide bulk encryption of persistent data, such as e-mail messages and document files. For example, Secure/Multipurpose Internet Mail Extensions (S/MIME) uses symmetric keys to encrypt messages for confidential mail, and Encrypting File System (EFS) uses symmetric keys to encrypt files for confidentiality.

Cryptography-based security technologies use a variety of symmetric key encryption algorithms to provide confidentiality. For more information about the specific encryption algorithms that are used by security technologies, see the applicable documentation for each technology. For more information about how the various symmetric key algorithms differ, see the cryptography literature that is referenced under "Additional Resources" at the end of this chapter.

Encryption algorithms that use different keys for encrypting and decrypting information are most often called public-key algorithms but are sometimes also called asymmetric key algorithms . Public key encryption requires the use of both a private key (a key that is known only to its owner) and a public key (a key that is available to and known to other entities on the network). A user's public key, for example, can be published in the directory so that it is accessible to other people in the organization. The two keys are different but complementary in function. Information that is encrypted with the public key can be decrypted only with the corresponding private key of the set. Figure14.2 shows basic encryption and decryption with asymmetric keys.

Figure14.2 Encryption and Decryption with Asymmetric Keys

Originally posted here:
Microsoft TechNet: Encryption

Open-Xchange launches in-browser encryption to combine security with ease of use [Q&A]

Data security used to be primarily about physically controlling where information was stored. But over the last few years the move towards greater use of mobile devices and increasing reliance on email for business communication has made securing information much more of a challenge.

The solution many organizations have turned to is encryption, particularly for emails, but is this the answer? Cloud collaboration specialist Open-Xchange is launching OX Guard, a fully integrated email security and encryption add-on to its OX App Suite.

OX Guard works inside the browser, with no need for special plugins or prior knowledge of encryption. Users of the OX environment will automatically receive decrypted emails, while external addresses can read encrypted content via a secure link.

We spoke to Open-Xchange CEO Rafael Laguna to find out about the role encryption has to play in ensuring security and privacy.

BN: How can encryption be used as part of a broader security strategy?

RL: Encryption adds another layer of security and complexity. Encrypted data at rest is pretty safe from prying eyes when stolen -- someone with malicious intent may be able to get to it, but it will make no sense, so it is worthless. Unfortunately the same applies when the legit consumer of the data wants to access them, some additional secure process to make it consumable again needs to be run, adding another cumbersome step.

BN: Doesnt encryption just add an extra layer of complexity making information harder to access and meaning people won't use it?

RL: Yes, indeed. This is why encryption hasn't been widely adopted in the mainstream. Encryption only gets user acceptance when it is easy to use. So encrypt as much as you can but keep the usability high.

BN: How can you overcome the problem of exchanging information with third-parties who arent using the same encryption system?

Read this article:
Open-Xchange launches in-browser encryption to combine security with ease of use [Q&A]

Black Duck Raises $20M To Advance Leadership In Open Source Software Logistics

Black Duck Software, an OSS Logistics solutions provider enabling the deployment and management of open source software (OSS), today announced that it has closed a $20 million investment round led by General Catalyst Venture Partners with all existing investors also participating in the round. The funding will be used to help the company expand its global go-to-market model to fulfill the rapidly growing OSS Logistics market opportunity. In addition, the company today announced the appointment of Stephen Gregorio as its Chief Financial Officer and Executive Vice President.

Gregorio, who played a critical role in securing the new funding, has over 25 years of financial management experience at high-growth technology companies including Verdasys, Interwise Corporation (acquired by AT&T), and Gensym Corporation, among others. Reporting directly to Black Duck President and CEO Lou Shipley, Gregorio will help Black Duck expand aggressively in the fast-growing OSS Logistics sector.

With this funding in place, we are well-positioned to advance OSS Logistics solutions across the enterprise, said Shipley. Over the next 18 months, we will release powerful new solutions aimed at solving critical supply chain and software development challenges that have resulted from the explosive growth of OSS in enterprises worldwide. Black Duck is among the first to recognize the need for a smarter, more efficient approach to streamlining, safeguarding, and managing the software development and deployment chain. As such, we are ready to help the worlds most innovative organizations better leverage, secure, and grow their investments in open source to achieve greater business success.

According to Gartner, a leading market research firm, 95 percent of all IT organizations will leverage non-trivial elements of OSS technology in their mission-critical IT portfolios by 2016, and fewer than 50 percent of organizations will have implemented an effective strategy for procuring and managing OSS. Black Duck has a rich history of helping Fortune 1000 firms dramatically improve software quality, hasten application development lifecycles, and improve compliance while mitigating security risks.

Black Ducks Board of Directors and investment advisors are equally optimistic about the companys future in this emerging market.

Weve partnered with Black Duck since it was founded, and over the past decade the company has successfully evangelized and supported the safe and proper use of open source software for thousands of enterprises worldwide. Now that OSS has matured and become ubiquitous across organizations of all sizes, they are ready to drive the next phase of explosive innovation and growth in the market, said Larry Bohn, Managing Director at General Catalyst Partners.Black Duck provides the only platform that enables enterprises to manage the increasingly complex OSS logistics frontier.Its a great example of a company weve been bullish on for a long time that maintained its focus while the market was catching up to its vision. Its future looks really exciting.

Further accelerating Black Ducks growth will be Gregorios proven financial management experience. In his previous positions, he successfully managed IPOs, handled merger and acquisition transactions on both sides, raised both debt and equity capital, and served as general counsel, negotiating customer, partnership, and channel agreements.

See more here:
Black Duck Raises $20M To Advance Leadership In Open Source Software Logistics

Time Travel Simulation Resolves “Grandfather Paradox”

What would happen to you if you went back in time and killed your grandfather? A model using photons reveals that quantum mechanics can solve the quandaryand even foil quantum cryptography

Entering a closed timelike curve tomorrow means you could end up at today. Credit:Dmitry Schidlovsky

On June 28, 2009, the world-famous physicist Stephen Hawking threw a party at the University of Cambridge, complete with balloons, hors d'oeuvres and iced champagne. Everyone was invited but no one showed up. Hawking had expected as much, because he only sent out invitations after his party had concluded. It was, he said, "a welcome reception for future time travelers," a tongue-in-cheek experiment to reinforce his 1992 conjecture that travel into the past is effectively impossible.

But Hawking may be on the wrong side of history. Recent experiments offer tentative support for time travel's feasibilityat least from a mathematical perspective. The study cuts to the core of our understanding of the universe, and the resolution of the possibility of time travel, far from being a topic worthy only of science fiction, would have profound implications for fundamental physics as well as for practical applications such as quantum cryptography and computing.

Closed timelike curves The source of time travel speculation lies in the fact that our best physical theories seem to contain no prohibitions on traveling backward through time. The feat should be possible based on Einstein's theory of general relativity, which describes gravity as the warping of spacetime by energy and matter. An extremely powerful gravitational field, such as that produced by a spinning black hole, could in principle profoundly warp the fabric of existence so that spacetime bends back on itself. This would create a "closed timelike curve," or CTC, a loop that could be traversed to travel back in time.

Hawking and many other physicists find CTCs abhorrent, because any macroscopic object traveling through one would inevitably create paradoxes where cause and effect break down. In a model proposed by the theorist David Deutsch in 1991, however, the paradoxes created by CTCs could be avoided at the quantum scale because of the behavior of fundamental particles, which follow only the fuzzy rules of probability rather than strict determinism. "It's intriguing that you've got general relativity predicting these paradoxes, but then you consider them in quantum mechanical terms and the paradoxes go away," says University of Queensland physicist Tim Ralph. "It makes you wonder whether this is important in terms of formulating a theory that unifies general relativity with quantum mechanics."

Experimenting with a curve Recently Ralph and his PhD student Martin Ringbauer led a team that experimentally simulated Deutsch's model of CTCs for the very first time, testing and confirming many aspects of the two-decades-old theory. Their findings are published in Nature Communications. Much of their simulation revolved around investigating how Deutsch's model deals with the grandfather paradox, a hypothetical scenario in which someone uses a CTC to travel back through time to murder her own grandfather, thus preventing her own later birth. (Scientific American is part of Nature Publishing Group.)

Deutsch's quantum solution to the grandfather paradox works something like this:

Instead of a human being traversing a CTC to kill her ancestor, imagine that a fundamental particle goes back in time to flip a switch on the particle-generating machine that created it. If the particle flips the switch, the machine emits a particlethe particleback into the CTC; if the switch isn't flipped, the machine emits nothing. In this scenario there is no a priori deterministic certainty to the particle's emission, only a distribution of probabilities. Deutsch's insight was to postulate self-consistency in the quantum realm, to insist that any particle entering one end of a CTC must emerge at the other end with identical properties. Therefore, a particle emitted by the machine with a probability of one half would enter the CTC and come out the other end to flip the switch with a probability of one half, imbuing itself at birth with a probability of one half of going back to flip the switch. If the particle were a person, she would be born with a one-half probability of killing her grandfather, giving her grandfather a one-half probability of escaping death at her handsgood enough in probabilistic terms to close the causative loop and escape the paradox. Strange though it may be, this solution is in keeping with the known laws of quantum mechanics.

In their new simulation Ralph, Ringbauer and their colleagues studied Deutsch's model using interactions between pairs of polarized photons within a quantum system that they argue is mathematically equivalent to a single photon traversing a CTC. "We encode their polarization so that the second one acts as kind of a past incarnation of the first, Ringbauer says. So instead of sending a person through a time loop, they created a stunt double of the person and ran him through a time-loop simulator to see if the doppelganger emerging from a CTC exactly resembled the original person as he was in that moment in the past.

See the original post:
Time Travel Simulation Resolves “Grandfather Paradox”

The Future of Security: Zeroing In On Un-Hackable Data With Quantum Key Distribution

Thieves steal data constantly, so protecting it is an ongoing challenge. There are more than 6,000 banks with 80,000 branches in the United States, nearly 6,000 hospitals and thousands of insurance companies, all with data that we want to be kept private. Traditionally, their valued data is protected by keys, which are transmitted between sender and receiver. These secret keys are protected by unproven mathematical assumptions and can be intercepted, corrupted and exposed if a hacker eavesdrops on these keys during transmission. Specific problems with current encryption technology include:

Standard methods for exchanging cryptographic keys are in jeopardy. RSA-1024, once commonly used to exchange keys between browsers and web servers, has probably been broken; its no longer regarded as safe by NIST, though RSA-2048 is still approved. This and other public-key infrastructure technologies perhaps havent been broken yet but soon will be by bigger, faster computers. And once quantum computers are mainstream, data encrypted using existing key exchange technologies will become even more vulnerable.

Researchers are working on methods to improve the security of software-based key exchange methods using what is known aspost-quantum cryptography methods that will continue to be effective after quantum computers are powerful enough to break existing key exchange methods. These are all based on the unprovable assertion that certain numerical algorithms are difficult to reverse. But the question that remains is difficult for whom? How do we know that an unpublished solution to these exact problems hasnt been discovered? The answer is we dont.

Quantum cryptography is the only known method for transmitting a secret key over long distances that is provably secure in accordance with the well-accepted and many-times-verified laws that govern quantum physics. It works by using photons of light to physically transfer a shared secret between two entities. While these photons might be intercepted by an eavesdropper, they cant be copied, or at least, cant be perfectly copied (cloned). By comparing measurements of the properties of a fraction of these photons, its possible to show that no eavesdropper is listening in and that the keys are thus safe to use; this is what we mean by provably secure. Though called quantum cryptography, we are actually only exchanging encryption keys, so researchers prefer the term quantum key distribution, or QKD, to describe this process.The no-cloning theorem is one of the fundamental principles behind QKD, and why we think that this technology will become a cornerstone of network security for high value data.

While products based on QKD already are being used by banks and governments in Europe especially Switzerland they have not been deployed commercially in the United States to any great extent. Current technological breakthroughs are pushing the distance over which quantum signals can be sent.Trials using laboratory-grade hardware and dark fibers optical fibers laid down by telecommunications companies but lying unused have sent quantum signals three hundred kilometers, but practical systems are currently limited to distances of about 100 kilometers. A scalable architecture that includes a Trusted Node to bridge the gap between successive QKD systems can both extend the practical range of this technology and allow keys to be securely shared over a wide ranging network, making large scale implementation possible and practical. Cybersecurity is making progress toward the future reality of sending data securely over long distances using quantum physics.

As an example, my team at Battelle, together with ID Quantique, has started to design and build the hardware required to complete a 650-kilometre link between Battelles headquarters and our offices in Washington DC. We are also planning a network linking major U.S. cities, which could exceed 10,000 kilometers and are currently evaluating partners to work with us on this effort. For the past year, we have used QKD to protect the networks at our Columbus, Ohio headquarters. But were not alone when it comes to quantum-communication efforts. Last month, China started installing the worlds longest quantum-communications network, which includes a 2,000-kilometre link between Beijing and Shanghai.

Many nations acknowledge that zeroing in on un-hackable data security is a must, knowing that even the best standard encryption thats considered unbreakable today will be vulnerable at some point in the future likely the near future. QKD is the best technically feasible means of generating secure encryption. Yes, it has its challenges, but continued innovation is tackling these issues and bringing us closer to the reality of long-distance quantum rollouts and truly secure and future-proofed network technology.

Does this mean that software-based methods wont have any value for network security applications? Of course not. One must always evaluate the cost of the protection against the cost associated with the loss of your data. But part of that evaluation must include the certainty of the security solution. So, while post-quantum cryptography and QKD may both be secure enough for a particular application, we use QKD when we want to know that our data is secure, without having to rely on unproven assumptions that it is.

In the long run, we envision an integrated network that includes software-based methods, which we call Tier III (cost conscious), alongside higher-security and commercially viable QKD (Tier II) solutions that use quantum methods with Trusted Nodes to distribute keys, but conventional encryption (AES, for example) to protect actual data. In this vision, there is also one higher level Tier I (very secure, very expensive) that uses quantum repeaters to transmit long, quantum-based keys and one-time-pad encryption to protect our highest value data, mostly government and military information.

QKD is an attractive solution for companies and organizations that have very high-value data. If you have data that you want to protect for years, QKD makes a lot sense. I think youll see this distributed across the country to protect that high-value, long-duration data. This is the future.

Read this article:
The Future of Security: Zeroing In On Un-Hackable Data With Quantum Key Distribution