{"id":101,"date":"2023-03-02T18:59:45","date_gmt":"2023-03-02T18:59:45","guid":{"rendered":"https:\/\/www.toshiba.eu\/?page_id=101"},"modified":"2023-05-15T15:20:04","modified_gmt":"2023-05-15T15:20:04","slug":"quantum-key-distribution","status":"publish","type":"page","link":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/","title":{"rendered":"Quantum Key Distribution"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Cyber security threats are increasing rapidly \u2013 particularly the threats posed by quantum computers<\/h2>\n\n\n\n<p>The public key cryptography used to protect our sensitive data today will be rendered insecure by the widescale availability of powerful quantum computers. It is critical that we keep our important confidential data quantum-safe \u2013 and doing so requires a new approach to security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Quantum-Secure Networking is the solution \u2013 and Quantum Key Distribution enables it.<\/h3>\n\n\n\n<p>QKD is a method of distributing quantum-safe encryption keys between parties, and it\u2019s the backbone of quantum-secure networks. Rather than mathematics, it uses the quantum properties of light to generate secure random keys for encrypting and decrypting data, ensuring QKD-protected transmissions can never be intercepted and decrypted by adversaries. This approach makes QKD provably secure, even against attacks that utilise quantum computers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Benefits of Quantum Key Distribution (QKD)<\/h3>\n\n\n\n<p>Deployable today, providing quantum-safe security regardless of an adversary\u2019s computing power<\/p>\n\n\n\n<p>Capable of detecting and mitigating eavesdropping attacks<\/p>\n\n\n\n<p>Peace of mind: provably secure and immune to future developments in mathematics and computing<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Long Distance QKD System LD<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensures quantum-secure networking over distances of 150 km+<\/li>\n\n\n\n<li>Optimises CAPEX, with fewer systems required to meet your distance needs<\/li>\n\n\n\n<li>Proprietary active stabilisation technology that adapts to the network environment<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Multiplexed QKD System MU<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Developed to deliver QKD in complex metro-scale environments, with the simplest integration<\/li>\n\n\n\n<li>Provably secure protection provided by the most advanced QKD protocol<\/li>\n\n\n\n<li>Proprietary active stabilisation technology that adapts to the network environment<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">FleXible QKD System LX<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Developed to deliver QKD in complex metro-scale environments, with the simplest integration<\/li>\n\n\n\n<li>Provably secure protection provided by the most advanced QKD protocol<\/li>\n\n\n\n<li>Proprietary active stabilisation technology that adapts to the network environment<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Why Toshiba QKD<\/h2>\n\n\n\n<p>Two decades of research, and unparalleled expertise.<\/p>\n\n\n\n<p>Toshiba has been at the cutting-edge of quantum cryptography since 1999. We\u2019re responsible for a series of world firsts in QKD development and deployment, and we continue to push the boundaries of quantum communication technologies. Our unique and patented QKD systems provide superior performance and real operational and business benefits \u2013 helping you to de-risk your network deployment while providing business agility.<\/p>\n\n\n\n<p>With a doctorate from Imperial College London and over 500 published papers in the field of quantum devices and systems, Dr Andrew Shields is a recognised world-leading expert with a highly respected, and growing, body of research.<\/p>\n\n\n\n<p>Dr Andrew Shields, Head of Toshiba Quantum Technology Division<\/p>\n\n\n\n<p>What is QKD?<br>Quantum Key Distribution technology uses the laws of quantum physics to create and distribute secure keys which prevent the decryption of data. Data protected by QKD is resilient to attack by a quantum computer or any other powerful computing resource. It provides protection from current attack methods, and, crucially, also provides resistance against future developments in quantum computing and mathematics.<\/p>\n\n\n\n<p>How does QKD work?<br>QKD is an optical technology that uses the quantum states of photons of light to transmit a secret key between two parties, enabling them to securely encrypt and decrypt data.<br>A key feature of the technology is its ability to detect and mitigate interception. A fundamental law of quantum physics \u2013 that observation itself disturbs the quantum state of a particle \u2013 means that if an eavesdropper tries to intercept the QKD signal, it will immediately change the signal\u2019s state. This makes the interception detectable and ensures any intercepted information is immediately discarded.<\/p>\n\n\n\n<p>How do you implement QKD?<br>By deploying a Toshiba QKD system on to an optical fibre network. There are two ways to do this:<br>\u25cf By integrating a QKD signal onto an existing deployed fibre (which is carrying classical data channels) using wavelength division multiplexing (WDM), with one of our Multiplexed (MU) QKD systems:<br>\u25cf By using dedicated fibre and deploying our Long-Distance (LD) or FleXible (LX) QKD systems.<\/p>\n\n\n\n<p>Toshiba\u2019s Multiplexed QKD systems include filters for simple integration into existing fibre networks and data services: all user traffic can be passed through the unit without requiring additional multiplexing hardware.<\/p>\n\n\n\n<p>The schematic shows an example use case, with an AES encryptor obtaining keys from a Multiplexed QKD system to secure high-bandwidth data streams.<\/p>\n\n\n\n<p>What are the security implications of quantum computing?<br>While it would take a conventional computer thousands of years to crack the encryption methods securing much of the web today, a sufficiently powerful (or cryptographically relevant) quantum computer would be able to decrypt the data in minutes. That means all communications \u2013 including transfer of sensitive records, such as financial and medical information \u2013 will be at risk.<br>Public key cryptography is widely used for exchanging encryption keys or for signing and verifying documents and transactions. Its security relies on the difficulty of certain mathematical problems, such as factoring a large number into its primes or the discrete logarithm problem. These problems can take many years to solve on a conventional computer. However, a quantum computer running Shor\u2019s algorithm can efficiently solve these problems, thereby breaking their security and rendering today\u2019s public key cryptography useless.<br>Why is encrypted data vulnerable in transit?<br>\u201cHarvest now and decrypt later\u201d attacks have been in the public awareness for some time, but have presented more of an abstract threat than a tangible one. As the availability and reliability of quantum computers increases, these kinds of attacks will come to fruition. Attackers who previously recorded and stored encrypted data in transit will be able to crack conventional public key encryption.<br>QKD mitigates this threat by making interception of the secure key that decrypts the data impossible.<\/p>\n\n\n\n<p>Why should you implement quantum-safe security?<br>Once quantum computers become readily available, the security methods we currently rely on to encrypt our data will no longer be effective.<br>Quantum-safe security is designed to ensure that even with a quantum-powered machine and endless amounts of time, malicious actors will not be able to decrypt communications. It uses the laws of quantum physics to counteract any attempt by a quantum computer to decrypt data transfers.<br>The security provided by QKD is not widely available on common fibre network infrastructures. It is only by implementing quantum-safe security that you can be certain of the integrity of your communications in a post-quantum world.<br>Where is QKD most applicable?<br>QKD creates and distributes secure encryption keys that are important for protecting highly sensitive data for many industries, as well as the critical infrastructure that underpins our society.<br>Robust levels of security are required in many sectors, including telecommunications networks, finance, defence, utilities and health sectors. In healthcare, the technology has been applied to ensure the secure transmission of medical data in Austria and genome data in Japan. Within the public sector, QKD is used to provide the government with secure communications; in the finance industry, to protect banking network infrastructure; and in aerospace and pharmaceuticals, to protect high-value long-life intellectual property.<\/p>\n\n\n\n<p>What is Post-Quantum Cryptography (PQC)?<br>Post-Quantum [Computing] Cryptography (PQC) refers to new cryptographic algorithms that are not based on the integer factorisation or discrete logarithm problems and are believed to be secure against attack by Shor\u2019s algorithm on a quantum computer. PQC uses complex mathematics to create encryption keys, and although its algorithms have been in development for some time, they have not yet been standardised, adopted and widely deployed.<br>As PQC has not been subject to the same level of scrutiny as the public key cryptography used over the past 40 years, we can expect some of these PQC algorithms will be broken in the coming years. This could be by a new algorithm on a quantum computer, or new methods in cryptanalysis using ordinary computers. Indeed effective attacks have been demonstrated on several proposed PQC algorithms.<br>Unlike PQC, Quantum Cryptography is provably secure, and is available and deployable today. Its security relies on fundamental laws of nature, which makes it immune from advances in quantum computing, mathematics, or eavesdropping activities.<\/p>\n\n\n\n<p>Can you implement QKD together with PQC?<br>Once PQC algorithms are fully standardised and widely available, it will be possible to deploy both QKD and PQC in conjunction. Indeed, there may be benefits in doing so. However, data needs to be protected and quantum safe today \u2013 organisations should not wait until PQC is ready and widely deployed.<br>For critical and sensitive data, key network routes and entities in the most \u2018at risk\u2019 sectors, deploying QKD now is the only way to secure networks from quantum-level attacks. It will be possible (and, as mentioned, potentially beneficial) to then add PQC in future, providing so-called \u2018defence in depth\u2019, with multiple layers of complex security keeping attackers at bay.<br>What are BB84 &amp; T12?<br>The Bennett-Brassard 1984 protocol, known as BB84, is a proven-secure method of exchanging quantum keys based on the \u2018uncertainty principle\u2019, which states that quantum data cannot be intercepted, copied, or measured without disturbing it.<br>BB84 generates the secure quantum keys used to encrypt data in QKD systems. Since it\u2019s necessary to exchange the secret keys over potentially unsecured channels, BB84 allows for the exchange of a key that, even in the event of eavesdropping, cannot be used by anyone except the intended recipient.<br>The BB84 protocol is the first and most rigorously studied way to exchange keys in quantum communications.<br>All Toshiba QKD products use an efficient implementation of the BB84 protocol called T12, which offers the highest possible secure key rates and operation over the longest fibres.<\/p>\n\n\n\n<p>When should you implement QKD?<br>As soon as possible. Implementing a new, quantum-secure cryptography approach takes time, and advances in quantum computing and its impending availability mean that quantum-safe methods of data encryption are soon going to be vital. Anyone operating without one will be in danger of having their secure data compromised.<br>It\u2019s understood that malicious actors are already engaging in so-called \u2018harvest now, decrypt later\u2019 attacks, whereby they\u2019re gathering encrypted data from organisations, with the intention to access it once quantum computers are more readily available.<br>For this reason, organisations should secure their most vulnerable infrastructure first \u2013 updating high-priority data paths, DC interconnects, and other critical infrastructure which is more likely to come under attack should they be targeted.<br>The sooner an organisation or individual transitions to quantum-secure networking, the safer it or they will be.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.linkedin.com\/in\/andrew-shields-366b3173\/\" target=\"_blank\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security threats are increasing rapidly \u2013 particularly the threats posed by quantum computers The public key cryptography used to protect our sensitive data today will be rendered insecure by&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":67,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-pages\/template-qkd.blade.php","meta":{"footnotes":""},"product":[15],"industry":[],"class_list":["post-101","page","type-page","status-publish","hentry","product-quantum-key-distribution"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quantum Key Distribution - What Is QKD? How Does It Work?<\/title>\n<meta name=\"description\" content=\"QKD is a method of distributing quantum-safe encryption keys. Discover what QKD is, its key benefits &amp; how it works from Toshiba quantum technology experts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Key Distribution - What Is QKD? How Does It Work?\" \/>\n<meta property=\"og:description\" content=\"QKD is a method of distributing quantum-safe encryption keys. Discover what QKD is, its key benefits &amp; how it works from Toshiba quantum technology experts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/\" \/>\n<meta property=\"og:site_name\" content=\"Toshiba Quantum Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-15T15:20:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/products\\\/quantum-key-distribution\\\/\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/products\\\/quantum-key-distribution\\\/\",\"name\":\"Quantum Key Distribution - What Is QKD? How Does It Work?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/#website\"},\"datePublished\":\"2023-03-02T18:59:45+00:00\",\"dateModified\":\"2023-05-15T15:20:04+00:00\",\"description\":\"QKD is a method of distributing quantum-safe encryption keys. Discover what QKD is, its key benefits & how it works from Toshiba quantum technology experts\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/products\\\/quantum-key-distribution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/products\\\/quantum-key-distribution\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/products\\\/quantum-key-distribution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quantum Key Distribution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/#website\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/\",\"name\":\"Toshiba Quantum Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/#organization\",\"name\":\"Toshiba Quantum Technology\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/app\\\/uploads\\\/2023\\\/04\\\/logo-toshiba.a8049d.gif\",\"contentUrl\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/app\\\/uploads\\\/2023\\\/04\\\/logo-toshiba.a8049d.gif\",\"width\":140,\"height\":38,\"caption\":\"Toshiba Quantum Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/solutions\\\/quantum\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/toshiba-qt\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Key Distribution - What Is QKD? How Does It Work?","description":"QKD is a method of distributing quantum-safe encryption keys. Discover what QKD is, its key benefits & how it works from Toshiba quantum technology experts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/","og_locale":"en_US","og_type":"article","og_title":"Quantum Key Distribution - What Is QKD? How Does It Work?","og_description":"QKD is a method of distributing quantum-safe encryption keys. Discover what QKD is, its key benefits & how it works from Toshiba quantum technology experts","og_url":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/","og_site_name":"Toshiba Quantum Technology","article_modified_time":"2023-05-15T15:20:04+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/","url":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/","name":"Quantum Key Distribution - What Is QKD? How Does It Work?","isPartOf":{"@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/#website"},"datePublished":"2023-03-02T18:59:45+00:00","dateModified":"2023-05-15T15:20:04+00:00","description":"QKD is a method of distributing quantum-safe encryption keys. Discover what QKD is, its key benefits & how it works from Toshiba quantum technology experts","breadcrumb":{"@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/quantum-key-distribution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.toshiba.eu\/solutions\/quantum\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/www.toshiba.eu\/solutions\/quantum\/products\/"},{"@type":"ListItem","position":3,"name":"Quantum Key Distribution"}]},{"@type":"WebSite","@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/#website","url":"https:\/\/www.toshiba.eu\/solutions\/quantum\/","name":"Toshiba Quantum Technology","description":"","publisher":{"@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.toshiba.eu\/solutions\/quantum\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/#organization","name":"Toshiba Quantum Technology","url":"https:\/\/www.toshiba.eu\/solutions\/quantum\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/#\/schema\/logo\/image\/","url":"https:\/\/www.toshiba.eu\/quantum\/app\/uploads\/2023\/04\/logo-toshiba.a8049d.gif","contentUrl":"https:\/\/www.toshiba.eu\/quantum\/app\/uploads\/2023\/04\/logo-toshiba.a8049d.gif","width":140,"height":38,"caption":"Toshiba Quantum Technology"},"image":{"@id":"https:\/\/www.toshiba.eu\/solutions\/quantum\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/toshiba-qt\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/pages\/101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":9,"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/pages\/101\/revisions"}],"predecessor-version":[{"id":1313,"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/pages\/101\/revisions\/1313"}],"up":[{"embeddable":true,"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/pages\/67"}],"wp:attachment":[{"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/media?parent=101"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/product?post=101"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.toshiba.eu\/solutions\/quantum\/wp-json\/wp\/v2\/industry?post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}