Operations

10/6/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Qubitekk to Present New Keyless Authentication Method Using Quantum Cryptography at IQC/ETSI Workshop

SAN DIEGO (October 3, 2014) -- San Diego startup Qubitekk (qubitekk.com) will present its quantum cryptography system for keyless authentication of machine-to-machine communications during the IQC/ETSI Quantum-Safe Crypto Workshop, to be held October 6-7 at the Fairmont Chateau Laurier in Ottawa, Canada. Dr. Duncan Earl, founder and CTO, will present Qubitekk’s system at Session 5 on October 7 at 10 AM.

Dr. Earl will discuss how Qubitekk’s unique solution represents an important improvement over traditional Quantum Key Distributions (QKD) systems that offer security over fiber-only channels. Qubitekk’s new authentication method is not susceptible to a quantum computer attack since it avoids reliance on secret keys or mathematical algorithms.

This workshop will bring together the diverse communities that will need to co-operate to standardize and deploy the next-generation cryptographic infrastructure, in particular, one that will be secure against emerging quantum computing technologies.

 "We’re looking forward to exploring our vision of quantum cryptography with the diverse communities attending the workshop,“ said Dr. Earl.  “Currently, no solution exists for securing communications in a post-quantum computer world.  We welcome the opportunity to demonstrate how Qubitekk’s solution is future-proof and will help guarantee the integrity of wired and wireless communications. “

Under a federal program Qubitekk is working in partnership with national laboratories, universities and major utilities to prepare for threats to critical infrastructure in the 21st century and beyond.

Qubitekk's goal is to fortify the U.S. power grid, which currently consists of about 30 million networked devices (power stations, transformers, reclosers, etc.), all of which use public key encryption. With the adoption of Smart Meters, that number is expected to reach 300 million by 2020. Each device is a potential entry point for malicious hackers.

This year, Qubitekk also announced the availability of the world’s first plug-and-play entangled photon generator, the QES1. Like the transistors at the hearts of classical computers, the QES1 enables the flow of information through quantum computers and quantum encryption products.

About Qubitekk, Inc.

San Diego-based Qubitekk, formerly known as GridCOM Technologies, is a private company founded in 2012 to commercialize the core technology required to speed the adoption of quantum computing and cryptography technologies and applications. Dr. Duncan Earl, founder and CTO, is one of the leading developers of quantum entanglement solutions, having served nearly 20 years at Oak Ridge National Laboratory (ORNL), most recently with the Cyberspace Sciences and Information Intelligence Research group. Learn more at www.qubitekk.com. Qubitekk's Quantum Data Locking technology was named as one of Popular Science magazine's 20 Ideas that will Change the World," in January 2014 under the company's former name, GridCOM Technologies. Since 2012 Qubitekk has raised more than $2 million in working capital.

About Dr. Duncan Earl

Dr. Duncan Earl is a visionary in developing optical technologies for both private businesses and government organizations. Prior to Qubitekk, he researched advanced technologies for national security applications at the Department of Energy’s Oak Ridge National Laboratory (ORNL).  One of his focal points was quantum encryption solutions for the emerging smart grid. Dr. Earl was named one of Smart Grid Today's “50 Pioneers of 2013” for his work developing quantum encryption technology to protect critical infrastructure. Dr. Earl holds a Ph.D. in Electrical Engineering, an M.S. in Physics and a B.S. in Engineering Physics from the University of Tennessee.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12716
PUBLISHED: 2018-06-25
The API service on Google Home and Chromecast devices before mid-July 2018 does not prevent DNS rebinding attacks from reading the scan_results JSON data, which allows remote attackers to determine the physical location of most web browsers by leveraging the presence of one of these devices on its l...
CVE-2018-12705
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have XSS via the SSID (it is validated only on the client side).
CVE-2018-12706
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have a Buffer Overflow via a long Authorization HTTP header.
CVE-2018-12714
PUBLISHED: 2018-06-24
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial o...
CVE-2018-12713
PUBLISHED: 2018-06-24
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was ...