A claimed first-of-a-kind quantum key distribution network offers 800 Gbps encryption under real-world environmental conditions and has been demonstrated to detect and defend against quantum threats. Credit: Sakkmesterke / Getty Images New research has revealed the full viability of a novel quantum key distribution (QKD) network for metropolitan areas that is resistant to quantum computing attacks. According to JPMorgan Chase, Toshiba and Ciena, the newly developed QKD network supports 800 Gbps encryption under real-world environmental conditions and can instantly detect and defend against quantum-enabled threats. In a claimed industry first, the network has also been demonstrated to secure a mission critical blockchain application, the firms stated.Quantum key distribution network “first of its kind”Under the leadership of JPMorgan Chase’s Future Lab for Applied Research and Engineering (FLARE) and global network infrastructure teams, researchers from all three organizations collaborated to achieve the following results:A QKD channel was multiplexed on the same fiber as ultra-high bandwidth 800 Gbps optical channels for the first time and used to provide keys for encryption of the data stream.Co-existence of the quantum channel with two 800 Gbps and eight 100 Gbps channels was demonstrated for a 70km fiber, with a key rate sufficient to support up to 258 AES-256 encrypted channels at a key refresh rate of 1 key/sec.Operation of QKD and the ten high-bandwidth channels was demonstrated for distances up to 100km.The proof-of-concept network infrastructure relied on Toshiba’s Multiplexed QKD System, manufactured by Toshiba Europe at their Cambridge UK base, and Ciena’s Waveserver 5 platform, equipped with 800 Gbps optical-layer encryption and open APIs running over Ciena’s 6500 photonic solution.QKD technology, robust encryption key to securing quantum computing future As the era of quantum computing beckons, QKD is the only solution that has been mathematically proven to defend against a potential quantum computing-based attack with security guarantees based on the laws of quantum physics, said JPMorgan Chase, Toshiba, and Ciena.“This work comes at an important time as we continue to prepare for the introduction of production-quality quantum computers, which will change the security landscape of technologies like blockchain and cryptocurrency in the foreseeable future,” commented Marco Pistoia, distinguished engineer and head of the FLARE research group. Speaking to CSO, Pistoia adds: “The success of this prototype shows that we now have a proven and tested method for defending the confidentiality of applications such as blockchain against future quantum-equipped eavesdroppers.” With QKD technology, organizations can ready themselves for the security needs of the future and will be better prepared to secure their applications against risks that may arise when quantum supremacy is reached, he says.With more sensitive information being distributed across fiber-optic networks every day, robust encryption is of vital importance, said Ciena CTO Steve Alexander. “As the quantum computing era approaches, research and development advances will continue to ensure the confidentiality of critical data as it travels over the network.” Related content news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Android Security Mobile Security news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe