Operations

10/6/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Qubitekk to Present New Keyless Authentication Method Using Quantum Cryptography at IQC/ETSI Workshop

SAN DIEGO (October 3, 2014) -- San Diego startup Qubitekk (qubitekk.com) will present its quantum cryptography system for keyless authentication of machine-to-machine communications during the IQC/ETSI Quantum-Safe Crypto Workshop, to be held October 6-7 at the Fairmont Chateau Laurier in Ottawa, Canada. Dr. Duncan Earl, founder and CTO, will present Qubitekk’s system at Session 5 on October 7 at 10 AM.

Dr. Earl will discuss how Qubitekk’s unique solution represents an important improvement over traditional Quantum Key Distributions (QKD) systems that offer security over fiber-only channels. Qubitekk’s new authentication method is not susceptible to a quantum computer attack since it avoids reliance on secret keys or mathematical algorithms.

This workshop will bring together the diverse communities that will need to co-operate to standardize and deploy the next-generation cryptographic infrastructure, in particular, one that will be secure against emerging quantum computing technologies.

 "We’re looking forward to exploring our vision of quantum cryptography with the diverse communities attending the workshop,“ said Dr. Earl.  “Currently, no solution exists for securing communications in a post-quantum computer world.  We welcome the opportunity to demonstrate how Qubitekk’s solution is future-proof and will help guarantee the integrity of wired and wireless communications. “

Under a federal program Qubitekk is working in partnership with national laboratories, universities and major utilities to prepare for threats to critical infrastructure in the 21st century and beyond.

Qubitekk's goal is to fortify the U.S. power grid, which currently consists of about 30 million networked devices (power stations, transformers, reclosers, etc.), all of which use public key encryption. With the adoption of Smart Meters, that number is expected to reach 300 million by 2020. Each device is a potential entry point for malicious hackers.

This year, Qubitekk also announced the availability of the world’s first plug-and-play entangled photon generator, the QES1. Like the transistors at the hearts of classical computers, the QES1 enables the flow of information through quantum computers and quantum encryption products.

About Qubitekk, Inc.

San Diego-based Qubitekk, formerly known as GridCOM Technologies, is a private company founded in 2012 to commercialize the core technology required to speed the adoption of quantum computing and cryptography technologies and applications. Dr. Duncan Earl, founder and CTO, is one of the leading developers of quantum entanglement solutions, having served nearly 20 years at Oak Ridge National Laboratory (ORNL), most recently with the Cyberspace Sciences and Information Intelligence Research group. Learn more at www.qubitekk.com. Qubitekk's Quantum Data Locking technology was named as one of Popular Science magazine's 20 Ideas that will Change the World," in January 2014 under the company's former name, GridCOM Technologies. Since 2012 Qubitekk has raised more than $2 million in working capital.

About Dr. Duncan Earl

Dr. Duncan Earl is a visionary in developing optical technologies for both private businesses and government organizations. Prior to Qubitekk, he researched advanced technologies for national security applications at the Department of Energy’s Oak Ridge National Laboratory (ORNL).  One of his focal points was quantum encryption solutions for the emerging smart grid. Dr. Earl was named one of Smart Grid Today's “50 Pioneers of 2013” for his work developing quantum encryption technology to protect critical infrastructure. Dr. Earl holds a Ph.D. in Electrical Engineering, an M.S. in Physics and a B.S. in Engineering Physics from the University of Tennessee.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8933
PUBLISHED: 2019-02-19
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on ...
CVE-2019-7629
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
CVE-2019-8919
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2019-8917
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...
CVE-2019-8908
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to execute arbitrary PHP code by going to the "Setting -> Mailbox configuration -> Registration email template" screen, and uploading an image file, as demonstrated by a .php filename and the "Content-Type: image/g...