My latest Math Review on Quantum Keys

Click MR2921421 to download my review of Skobelev’s article On the Computational Security of Quantum Algorithms. Hint: Eve wins if she can control the classical channel and have good stats on the pseudo-random number generator.

Dark Fiber and White Space

Two underused resources, “Dark Fiber” and “White Space” are to be taken advantage of to increase the power of the network.

 

One application seeks to use optic fiber that has being laid but not being used to enable the establishment of secure keys using quantum technology http://www.technologyreview.com/computing/23317/page1/

The other is a wireless network in which the information is carried in the unused interstices of the TV spectrum. http://www.technologyreview.com/communications/23781/

Quantum Key Distribution

Since the introduction of the original ideas by Wiener and further development by Bennet, Brassard, Salvail, Smolin and others in the 1980’s, Quantum Cryptography has being making steady progress towards practical applications.
Currently some banks and government departments are using Quantum technology based on the transmission of single photons over fiber-optic links to transmit unconditionally secure cryptographic keys. However current technology allows for transmission only over relatively short distances at limited transmission rates.
One of the main drawbacks of quantum encryption is the difficulty of generating and transmitting individual photons without a loss of information because of interactions between photons and the medium.
An article describing Quantum Key Distribution can be found here.
I have compiled a list of companies (not exhaustive) that offer hardware based on different aspects of quantum cryptography. Without any claim of performance and in no particular order they are:

IBM, Hewlett-Packard and NEC also have extensive research projects on quantum cryptography. (NEC have announced delays in the marketing of its products).
There is a tremendous amount of research effort and money being spent on this technology as the prize for a practical technology that allows unconditional secure key generation will be huge.