TITLE

Making a key advance . .

AUTHOR(S)
Knight, Helen
PUB. DATE
October 2004
SOURCE
Engineer (00137758);10/8/2004, Vol. 293 Issue 7661, p12
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This article reports that Great Britain researchers have built the world's fastest quantum key distribution system, a major step in the move towards transmitting large amounts of unbreakable coded information. The system transmits encrypted information down standard telecom fibre, and the researchers ultimately hope to use it to send compressed video between two points with absolute security. This could allow it to be used in the defence and banking industries for sending sensitive video footage and for secure video conferencing. Quantum cryptography has the potential to provide verifiably secure data transmission, as it uses streams of single phctons so sensitive that unwanted observation by a third party causes errors in the code, which can then be detected by the users.
ACCESSION #
14781027

 

Related Articles

  • An Approach of Quantum Steganography through Special SSCE Code. Banerjee, Indradip; Bhattacharyya, Souvik; Sanyal, Gautam // World Academy of Science, Engineering & Technology;Aug2011, Issue 56, p939 

    Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio...

  • What is Encryption? Reinhold, Arnold G. // America's Network;12/01/99, Vol. 103 Issue 18, p12S 

    Provides an excerpt from the paper titled Strong Cryptography: The Global Tide of Change, published in September 17, 1999 by the Cato Institute.

  • CRYPTOLOGY AND COMMUNICATION SECURITY. Kant, Shri // Defence Science Journal;2012, Vol. 62 Issue 1, following p31 

    An introduction is presented in which the editor discusses various reports within the issue on topics including steganalysis, crypto algorithms and data encryption standards (DES).

  • THE CLIPPER ENCRYPTION SYSTEM. Denning, Dorothy E. // American Scientist;Jul/Aug93, Vol. 81 Issue 4, p319 

    Provides information on the emergence of the clipper encryption system in the U.S. Background on cryptography; Function of and benefits from the encryption technology; Consequences of the clipper encryption system.

  • Complexity Bounds on General Hard-Core Predicates. Goldmann, Mikael; Naslund, Mats; Russell, Alexander // Journal of Cryptology;2000, Vol. 13 Issue 3, p177 

    A Boolean function b is a hard-core predicate for a one-way function f if b is polynomial-time computable but b(x) is difficult to predict from f(x). A general family of hard-core predicates is a family of functions containing a hard-core predicate for any one-way function. A seminal result of...

  • Quantum keys secure satellite data. Kren, Lawrence // Machine Design;12/10/98, Vol. 70 Issue 22, p58 

    Reports on the development of photon quantum keys. Weaknesses of existing encryption methods; Quantum cryptographic keys; Position and sequence of data bits.

  • Cryptology getting started EXAMPLE.  // Tech Directions;Oct2001, Vol. 61 Issue 3, p13 

    Presents procedures in making an encryption wheel using cryptology. Lists of materials needed; Details of the procedures in making a scytale; Illustration of examples.

  • The new cryptography. Sterling, Bruce // Fantasy & Science Fiction;May94, Vol. 86 Issue 5, p73 

    Focuses on cryptography, the science of ancient writing. Ancient places where cryptography was used; Use of cryptography during the war; Impact of technology on the context of the use of cryptography; Development of encryption as a business in the 1990s; Types and classes of cryptography.

  • Cryptographers safeguard message traffic in free space. Jones-Bey, Hassaun // Laser Focus World;May99, Vol. 35 Issue 5, p167 

    Focuses on quantum cryptography. Explanations from researcher Richard Hughes; Main advantage of working in a free space.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics