Progress in Quantum Cryptography
|
|
|
- Godwin Johns
- 10 years ago
- Views:
Transcription
1 Progress in Quantum Cryptography The 5th Symposium of Laboratory of Physical Foundations of Information Processing 27 th - 28 th January 2014 Wroclaw University of Technology Wrocław, Poland
2 The 5th LFPPI Symposium on Progress in Quantum Cryptography Date: 27th-28th January 2014 Location: Wroclaw University of Technology (WUT), Wroclaw, Poland Organizers: - Laboratory of Physical Foundations of Information Processing (LFPPI), Wroclaw branch - National Laboratory for Quantum Technologies (NLTK), Wroclaw branch - Institute of Physics, Institute of Informatics, Electronics Faculty, WUT - CompSecur, WUT spin-off company Symposium registration deadline: 25th January 2014 Other deadlines (only for authors of contributions): Abstract submission deadline: 20th December 2013 Notification of acceptance (oral/poster): 8th January 2014 Accepted paper submission deadline: 20th February [email protected] Tel The 5th LFPPI Symposium: Progress in Quantum Cryptography SeQre2014 is a unique international event that will present both the current scientific and application prospects of quantum cryptography in view of recent progress in development of quantum computers, aiming to bring together academic societies of outstanding quantum physicists, computer scientists and engineers with representatives of industry considering quantum cryptography deployment. The symposium is organized on the occasion of Wroclaw metropolitan QKD network deployment (one of the first few quantum networks worldwide) based on experimental non-entanglement and entanglement QKD systems. During the symposium a practical demonstration of QKD systems by leading companies addressed to industry and security sector of finance and administration is planned. The Symposium aims also to elevate interest and commercial support for QKD systems development from the side of bank and administration representatives invited to participate in the event. The LFPPI Symposium series consists of small scale events addressed to progress in quantum information and communication traditionally honored by distinguished invited speakers (in the past the symposium was honored by the lectures of among others prof. Artur Ekert, prof. Christopher Fuchs and prof. Gerard t Hooft). The 5th LFPPI Symposium will be focused on the progress of quantum cryptography and will take only two days, creating though an opportunity for discussion among most advanced experts in modern quantum cryptography (including authors of the most important concepts in this field, as well as companies commercializing already maturing systems). Conference location: Wrocław University of Technology A-1 Bulding (main entrance and Aula - main auditorium, 2nd floor) Institute of Physics Wyb. Wyspiańskiego Wrocław, Poland Scan this QR Code to get directions
3 Programme 1st day - 27th January (Monday) 8:30-10:00 Registration at conference front desk 10:00-10:20 Greetings and introduction from the organizers Scientific session 1 - invited lectures 10:20-11:05 Opening lecture: Future of quantum communication: quantum networks, quantum repeaters and device-independent QKD Prof. Nicolas Gisin (University of Geneva, IDQuantique) 11:05-11:50 Invited lecture: The ultimate limits of privacy for the paranoid ones Prof. Artur Ekert (University of Oxford, National University of Singapore, Center for Quantum Technologies) 11:50-12:35 Invited lecture: How secure is quantum cryptography in practice? Prof. Vadim Makarov (University of Waterloo, Quantum Hacking Laboratory) 12:35-13:20 Invited lecture: Quantum information theory and its resources Prof. Marek Kuś (Polish Academy of Science, Warsaw) End of Scientific session 1 13:20-14:20 Lunch break Industry session 1 - invited companies 14:20-14:40 Technical lecture / Product presentation AIT (Austria) 14:40-15:00 Technical lecture / Product presentation IDQuantique (Switzerland) 15:00-15:20 Technical lecture / Product presentation Toshiba (Japan) 15:20-15:40 Technical lecture / Product presentation NTT (Japan) 15:40-16:00 Technical lecture / Product presentation SeQureNet SA (France) 16:00-16:20 Technical lecture / Product presentation MagiQ Inc. (USA) End of Industry session 1 16:20-16:40 Coffee break Scientific session 2 16:40-18:00 Invited LFPPI lectures on progress in quantum cryptography and quantum information End of Scientific session 2 18:00 Transfer of guests to hotels 19:30-21:00 Dinner at the city old square 2nd day - 28th January (Tuesday) Scientific session 3 - oral contributions 10:00-12:00 Series of contributed lectures on progress in quantum cryptography End of Scientific session 3 12:00-13:00 Lunch Break Parallel certified training session for business and administration in Polish language Industry session 2 / QKD hands-on training second session for business and industry representatives 13:00-15:30 Technical lectures and training demonstrations of entanglement and non-entanglement QKD systems with hands-on workshops. Presented systems: among others entanglement based AIT EPR SYS- 405 (Austria), non-entanglement based IDQuantique Clavis2 (Switzerland), continous variable based SeQureNet Cygnus (France). Technical consultancies: AIT, IDQuantique, SeQureNet, NTT, Toshiba, MagiQ, CompSecur, NLTK WUT. End of Industry session 2 15:30-16:00 Coffee break with poster session (with networking reception) Summary and discussion 16:00-18:00 Discussion panel and closing of the symposium. Also including establishment of a CMQCRD consortium and discusion of prospects for international cooperation with leading research centers and commercial companies in scope of QKD development Excursion to Panorama of the Battle of Racławice exhibition. Certified quantum cryptography training for business 2nd day - 28th January On the 2nd day of the seqre2014 Symposium a certified QKD training in Polish language for business and administration will take place. Training will cover fundamental theoretical and practical aspects of quantum cryptography. Quantum key distribution systems will be subject of hands-on workshops. The Laboratory of Quantum Cryptography within the WUT National Laboratory for Quantum Technologies along with CompSecur R&D will provide QKD systems for training purposes (both non-entanglement and entanglement based systems will be included). Training conducted in Polish language will be free of additional charge. Each participant will have an opportunity to familiarize with high-end QKD technology in the area of modern communication security. Also comprehensible theoretical lectures will allow to understand most important issues connected with this technology from a business and administration points of view. After completing training session each participant will obtain a personal certification document issued by the organizing consortium LFPPI/ NLTK/IPWUT/CompSecur, formally confirming acquired knowledge.
4 Invited speakers Prof. Nicholas Gisin, Group of Applied Physics, University of Geneva, ID Quantique SA Prof. Nicolas Gisin was born in Geneva, Switzerland, in After a post-doctoral degree at the University of Rochester, NY, in 1984 he joined a start-up company, Alphatronix, dedicated to fiber instrumentation for the telecommunication industry. In 1988 an opportunity to join the Group of Applied Physics at the University of Geneva as head of the optics section brought him back to the academic life. At the time the optics section was mostly working on classical communication. Prof. Gisin invented the measurement technique for Polarization Mode Dispersion most widely used today. In the early 1990 s Prof. Gisin started research in quantum optics. The main focus is to combine the group s broad expertise in optical fibers with a study of basic quantum effects. In 1993 his group demonstrated quantum cryptography under Lake Geneva. In 2009 he received the first John S. Bell award for the demonstrations of long distance entanglement and quantum teleportation, together with his numerous contributions to the theory of Bell inequalities. His group is world leader in quantum communication. In 2001 he co-founded ID Quantique. Prof. Artur Ekert, University of Oxford, National University of Singapore, Centre for Quantum Technologies Singapore Prof. Artur Ekert (born in 1961 in Wrocław, Poland) is a Professor of Quantum Physics at the Mathematical Institute, University of Oxford, and a Lee Kong Chian Centennial Professor at the National University of Singapore and also the Director of CQT (Centre for Quantum Technologies). His research interests extend over most aspects of information processing in quantum-mechanical systems, with a focus on quantum communication and quantum computation. He is best known as one of the inventors of quantum cryptography. Artur Ekert s research extends over most aspects of information processing in quantum-mechanical systems, with a focus on quantum cryptography and quantum computation. Building on the idea of quantum non-locality and Bell s inequalities he introduced entanglement-based quantum key distribution in his 1991 paper which generated a spate of new research that established a vigorously active new area of physics and cryptography, and is still the most cited paper in the field. He is a recipient of several awards, including the 1995 Maxwell Medal and Prize by the Institute of Physics and the 2007 Royal Society Hughes Medal. Prof. Vadim Makarov, University of Waterloo, Institute for Quantum Computing, Quantum Hacking Laboratory Prof. Vadim Makarov (born in 1974 in Leningrad, currently St. Petersburg) is a widely acknowledged specialist in quantum hacking, a discipline which aims to find loopholes in imperfect physical implementations of otherwise theoretically unconditionally secure quantum cryptographic commercial systems. He is an author of the so called blinding attack on some commercial versions of QKD systems, allowing to take control over single photon detector by appropriately blinding it with a high intensity light and thus rendering QKD procedure effectively insecure (by eavesdropping of the exchanged symmetric key). Prof. Vadim Makarov is currently supervising investigations of other possible attack classes on different imperfect QKD physical implementations by heading the Quantum Hacking Laboratory within the Institute of Quantum Computing at University of Waterloo, and is also additionally consulting leading quantum cryptography companies in patching their QKD systems against proven attacks. Prof. Marek Kuś, Center for Theoretical Physics, Polish Academy of Sciences Warsaw, Head of Scientific Council of the National Quantum Information Center in Gdansk Prof. Marek Kuś (born 1955 in Warsaw, Poland) is a Professor of Physics at the Center for Theoretical Physics of the Polish Academy of Sciences in Warsaw, Poland and the Head of Scientific Council of the National Quantum Information Center in Gdańsk, Poland. He obtained his Ph. D. degree from the Department of Physics of the University of Warsaw, Poland and continued his research as a post-doc and a visiting professor at universities in United States, Germany and France. His scientific interests encompass quantum chaos and quantum information theory with a special emphasis on applications of algebraic and differential geometry to description of composite quantum systems and theory of entanglement.
5 Invited companies AIT Austrian Institute of Technology Safety and Security Department of AIT, one of the world-leading centers in development of entanglement based quantum cryptography. Austria s largest non-university research institute of public shareholders. The areas of research range from theoretical quantum information and the development of low level new algorithms for processing quantum keys, over the development of novel highly integrated quantum optical components to the development of key distribution networks and concepts for the integration into existing critical high security applications and infrastructures. Represented by: Dr. Andreas Poppe, AIT Austrian Institute of Technology, Safety and Security Department ID Quantique SA Leader in high-performance multi-protocol network encryption based on conventional and quantum technologies (Quantum Key Distribution QKD). Provider of optical instrumentation products, notably photon counters and related electronics. The company provides network security solutions and services to the financial industry, defence and government organizations and other enterprises globally. IDQ maintains close ties with leading academic institutions by participating to several Swiss and European R&D programs and plays a leading role in cutting-edge projects such as the SwissQuantum quantum key distribution testbed. IDQ offers a broad range of high-security layer 2 encryptors for high-speed networks up to 10Gbps. Represented by: Dr. Grégoire Ribordy, IDQuantique CEO SeQureNet SeQureNet brings to the market products relying on continuous variable quantum key distribution (CVQKD) in order to provide high security assurances for network services and practical applications. Building on the work done on continuous variables prototypes during SECOQC and SEQURE research projects, SeQureNet brings CVQKD to the market through software and hardware products and services. These are aimed both at the academic and the IT security usage; complete systems as well as building blocks for reseachers devising their own experiments are available. Represented by: Dr. Sébastien Kunz-Jacques, CTO and Dr. Paul Jouguet, R&D Engineer - CEO MagiQ Inc. One of the pioneering companies to commercialize QKD systems. Beyond QKD MagiQ areas of expertise include fiber optics, high-speed electronics and RF, acoustics, active feedback, FPGAs and software. MagiQ Research Labs provides custom products, design engineering, and contract research and development services for optics, quantum information, fiber sensing, aerospace and defense applications. MRL also contracts directly with private firms and government agencies such as the Navy, Army, DARPA, and NASA. Represented by: Dr. Anton Zavriev, Director of MagiQ Research Labs NTT (The Nippon Telegraph and Telephone Corporation) A Japanese telecommunications company headquartered in Tokyo, Japan. Ranked 29th in Fortune Global 500, NTT is the largest telecommunications company in the world in terms of revenue. The NTT Basic Research Laboratories conducts research in many different fields, inter alia nanotechnology, quantum information technology, quantum computers, quantum bits and quantum cryptography. NTT is taking a part in The Tokyo QKD network constructed in a part of the NICT open test-bed network Japan Giga Bit Network 2 plus, inaugurated on 14th October 2010, together with project teams consisting of NICT, NEC, Mitsubishi Electric, Toshiba Research Europe, ID Quantique, the Austrian Institute of Technology, the Institute of Quantum Optics and Quantum Information and the University of Vienna. Represented by: Dr. Kiyoshi Tamaki, Quantum Optical State Control Research Group, NTT Basic Research Laboratories. Toshiba (Toshiba Research Europe Ltd.) Toshiba is developing a new approach to information technology that applies the fundamental laws of Quantum Physics to network communications and computing. Toshiba is at the forefront of quantum information R&D and have developed one of the world s leading system for quantum cryptography. In parallel Toshiba creates the advanced nanotechnology required in future quantum information systems. Toshiba Research Europe Limited (TREL) is part of Toshiba s global R&D activity. The Cambridge Research Laboratory of TREL conducts research on quantum information technology, as well as speech recognition and synthesis. Represented by: Dr. Andrew Shields, Assistant Managing Director, Toshiba Research Europe Ltd.
6 Wrocław QKD network Due to significant investments in Wrocław University of Technology laboratory equipment encompassing current state-of-the-art quantum cryptography technologies within the Polish National Quantum Technologies Laboratory NLTK network programme, as well as technological partnerships with internationally leading vendors of quantum cryptographic systems and national information security institutions and companies, city of Wroclaw now hosts a unique metropolitan quantum network research and development project. An analysis of the backbone architecture of Wroclaw metropolitan network and its key nodes is carried out towards identifying connections of a highest potential in regard to securing with quantum cryptography (analysis includes classification of the threats on the particular nodes and the connection lines, technical characteristics of optical fibers connecting the backbone network nodes and levels of nodes importance from technical network, business and administration perspective). National Quantum Technologies Laboratory NLTK, Wrocław University of Technology
7 Experimental and even early commercial QKD implementations are very susceptible to technical conditionings of the transmitting media (i.e. optical fiber infrastructure and associated alignment of the quantum optics) therefore deployment of QKD systems in real metropolitan optical fiber infrastructure network poses a challenge. The optical infrastructure is determined by the city telecommunication canalization layout. Dark fibers connecting two, even not very distant metropolitan locations physically sharing an industry-standard telecom line with many parallel fibers (constituting the initial P2P topology and medium for QKD network) are divided in a series of thermally welded interconnections and junctions at telecom canalization crossings, which are main reason for decoherence and quantum signal losses, resulting with increased QBER and with infeasibility of key distribution in practical scenarios (this is specifically addressed to dark fiber infrastructure of metropolitan backbone telecom networks with multiple interconnections of telecommunication optical lines, which are implemented by thermal weldings a connection between two locations separated by ca. 4-5 km distance, is usually divided by even several fiber weldings) Research project: The project combines industrial and pre-deployment research over practical aspects of decoherence of qubits in quantum channels constituted by different types of optical fibers and standardized telecommunication optical connectors along with technological imperfections of qubit sources and detectors, which together stand as the most fundamental obstacles in practical applications of QKD towards realistic deployments in metropolitan networks combining both the no-entanglement and entanglement based QKD methods as implemented in the project laboratories by the no-entanglement IdQuantique Clavis II and the entanglement based Austrian Institute of Technology EPR Quelle QKD systems. The ongoing research programme includes technical characteristics and conditionings of the entangled and non-entangled qubits sources, channels and detectors for the experimental QKD systems, topological network configurations concepts, authentication problems, development of classical protocols stack responsible for the QKD key sifting, error correction and privacy amplification, network (hardware) and software integration interfaces and proper configuration towards deployment of experimental systems in metropolitan network environments. Research programme: Technical conditioning of non-entangled and entangled quantum information carriers sources, and the possibilities to encode information in QKD systems (laser operation characteristics, parametric down conversion characteristics). Decoherence of quantum information carriers in different technical configurations of optical fiber telecommunication networks in non-entanglement and entanglement based QKD systems. Technical conditioning of quantum information carriers detection in non-entanglement and entanglement based QKD systems. Conditioning of topological configuration of non-entanglement and entanglement based QKD systems in realistic metropolitan fiber optics network environments. Quantum cryptographic session authentication problem for non-entanglement and entanglement based QKD systems. Development of QKD protocol stack (including classical algorithms of key reconciliation, error correction and privacy amplification) and interface systems. Evaluation of commercial backbone telecom networks deployment feasibility of non-entanglement and entanglement based QKD systems. Development of technical documentation for installation and configuration of the experimental QKD systems in commercial backbone telecom networks. Research on QKD deployment in practical telecommunication network environments resulted in evaluation of boundary conditions for QKD feasibility versus quantum channel and transmission parameters and a successful resolution of channel quality problem by proper alignment of experimental QKD setups. The fiber optics line of the SMF28 standard has been used to test different connection and welding configurations for two R&D QKD approaches based on the IdQuantique Clavis2 setup (non-entanglement QKD, encoding qubits on interfering phase shifts of laser impulses in Mach-Zehnder interferometers) and the AIT Quelle setup (entanglement QKD, encoding qubits on polarizations of entangled photon pairs generated in non-linear PDC process in a BBO crystal). The main optics fiber line (single mode SMF28 standard) has been subsequently modified in laboratory test runs by welded or interconnected F3000/APC and FC/PC adapters. The interconnectors resulted with high QBER increases, thus favoring thermal welding which in proper proximity distribution were characterized by ca. 10 times lower loss induction than interconnectors (ca db per welding, depending on the proximities). Next the industry standard telecom fiber optics line tests have been carried out towards welding and interconnections configuration optimizing in regard to QBER and conditioning of the metropolitan network deployment. Primary focus was directed towards the non-entanglement based setup which turned out to be operating properly with an acceptable raw key exchange rate (RKER) generating targeted amount of distilled secret bits (DSB) under laboratory simulation of real optic fiber backbone metropolitan network configuration with required optimization of interconnections and welding infrastructure. The entanglement based QKD has been tested for the first time in a real telecom network environment and proved to be also feasible but within a very narrow gap of optical elements alignment and poor (unpractical) values of QBER and RKER with high additional instability of operation parameters.
8 The 5th LFPPI Symposium Progress in Quantum Cryptography seqre2014 SCIENTIFIC COMMITTEE Prof. LUCJAN JACAK Head of LFPPI WUT Laboratory of Physical Foundations of Information Processing, Head of NLTK WUT National Laboratory for Quantum Technologies, Institue of Physics, Wrocław Universit of Technology Prof. IRENEUSZ JÓŹWIAK Head of Division of Security And Reliability of Computer Systems, Institute of Informatics,Wrocław University of Technology Prof. JAN ZARZYCKI Dean of the WUT Faculty of Electronics, Head of Signal Theory Department, Wrocław University of Technology Prof. MAREK KUŚ Head of Scientific Council of the National Quantum Information Center in Gdansk, Center for Theoretical Physics, Polish Academy of Sciences Warsaw Prof. RYSZARD GONCZAREK V-ce Dean of WUT Faculty of Fundamental Problems of Technology, Institue of Physics, Wrocław University of Technology LOCAL ORGANISATION COMMITTEE Dr. WITOLD JACAK Institue of Physics, WUT (chairman) Dr. WOJCIECH DONDEROWICZ CompSecur M. Sc. PRZEMYSLAW TOMCZAK CompSecur Dr. JACEK GRUBER Institute of Informatics, WUT Dr. ADAM GONCZAREK Institute of Informatics, WUT Dr. JANUSZ JACAK Institue of Physics, WUT M. Sc. DAMIAN MELNICZUK NLTK, WUT Symposium secretary: M. Sc. MAŁGORZATA HAMBERG NLTK, WUT M. Sc. BEATA CZARKOWSKA CompSecur ORGANIZERS The Laboratory of Physical Foundations of Information Processing is a Polish scientific network under Committee of Science, which groups about 20 Polish Scientific Institutions, that undertake active research in scope of quantum information. CompSecur is an academic WUT spin-off profiled in IT security. The company is accredited by PARP National Agency in scope of IT security services and has implemented R&D projects in cooperation with WUT in quantum cryptography practical deployment. The National Laboratory for Quantum Technologies, NLTK (Polish national network of state of the art quantum university laboratories) was created by the initiative of the National Center for Research and Development in cooperation with the LFPPI. NLTK consortium is implementing a large research infrastructure programme in context of quantum technologies, including especially quantum optics laboratory equipment. NLTK at Institute of Physics WUT includes state-of-the-art Quantum Cryptography Laboratory that consists of prototype QKD devices and commercially available R&D systems. HONORARY PATRONAGE MEDIA PATRONAGE Prof. Tadeusz Więckowski Rector of Wroclaw University of Technology Dr. Rafał Dutkiewicz Mayor of the City of Wroclaw Prof. Krzysztof Kurzydłowski Director of The National Center for Research and Development INSTITUTIONAL PATRONAGE
Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com
Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4
Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve
Securing Your Data In Transit For The Long Term
Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum
Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
World Class Standards. QKD in ETSI. Gaby Lenhart Strategy and New Initiatives ETSI 2009. All rights reserved ECOC 2009
QKD in ETSI ECOC 2009 Gaby Lenhart Strategy and New Initiatives ETSI 2009. All rights reserved Current Use of QKD ECOC 2009 QKD already in use I 11. October 2007 Swiss Federal Elections ( http://www.idquantique.com/news/news-elections2008.htm)
230483 - QOT - Quantum Optical Technologies
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications
High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com
High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD
A High Speed Quantum Communication Testbed
A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward
CURRICULUM VITAE. Igor V. Maslov. 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304. Web: http://www.columbia.edu/~ivm3/
CURRICULUM VITAE 1 Igor V. Maslov Contact information 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304 Tokyo 151-0073 E-mail: [email protected] Japan Web: http://www.columbia.edu/~ivm3/ Education
ISEAC 35. First Circular. 35 th International Symposium on Environmental Analytical Chemistry. June 22-26, 2008. Gdańsk, Poland
.: 35 th International Symposium on Environmental Analytical Chemistry Gdańsk, Poland, 22-26.06.2008 First Circular 35 th International Symposium on Environmental Analytical Chemistry June 22-26, 2008
Quantum Telecommunications Networks. Dr Tim Whitley MD, Research and Innovation, BT
Quantum Telecommunications Networks Dr Tim Whitley MD, Research and Innovation, BT BT has a long history of innovation including significant optical transmission firsts World Firsts 1846: Telecommunications
Department of Information Technology and Electrical Engineering. Master. Electrical Engineering and Information Technology
Department of Information Technology and Electrical Engineering Master Electrical Engineering and Information Technology Welcome Curriculum Structure Electrical engineers continue to invent and to shape
How To Become An Electrical Engineer
Department of Information Technology and Electrical Engineering Master Electrical Engineering and Information Technology Welcome Electrical engineers continue to invent and to shape the future of the digital
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College
Programme Specification BSc Honours Electronic Engineering (Final Year Programme) Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College SECTION 1: GENERAL INFORMATION
Quantum technologies may be in their. nascence, but strategies regarding. their potential use cases within. defense and intelligence are not.
WHITE PAPER NOVEMBER 2015 Place Your Bets: Creating a Quantum Technology Strategy for Defense Firms Evan Rolfe Quantum technologies may be in their nascence, but strategies regarding their potential use
SCHOOL OF ENGINEERING. www.warwick.ac.uk/go/engineering RESEARCH DEGREES TAUGHT MASTER S DEGREES CONTACT DETAILS RESEARCH GROUPS
Warwick s is one of the leading engineering schools in the UK. We offer a range of specialist taught Master s courses and research degrees. The School has a strong research profile placing it in the top
Sponsoring & Exhibitors. VIRTUELLES FAHRZEUG May 18-20, 2015 - Graz, Austria. Interdisciplinary Development of the Vehicle 2020+ Information for
Interdisciplinary Development of the Vehicle 2020+ Processes, Methods, Tools for Automated, Energy Efficient and Cooperative Vehicles Information for Sponsoring & Exhibitors www.gsvf.at CONTACT: Julia
H103: General Engineering
H103: General Engineering Undergraduate BEng 2016 Essentials UCAS code Degree Professional accreditation Mode of study Duration Location A-Level International Baccalaureate Department(s) Website Email
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER
1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet
How To Support High Performance Computing
1 of 12 One Hundred Second Congress of the United States of America AT THE FIRST SESSION Begun and held at the City of Washington on Thursday, the third day of January, one thousand nine hundred and ninety-one
Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?
Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Ioannis P. Antoniades 1, Amalia N. Miliou 2, Miltiades K. Hatalis 3 1 Department of Informatics, Aristotle University of Thessaloniki,
Education Programs of the Institute for Optical Sciences at the University of Toronto
Education Programs of the Institute for Optical Sciences at the University of Toronto Emanuel Istrate and R. J. Dwayne Miller Institute for Optical Sciences, University of Toronto 60 St. George Street,
Department of Commerce National Institute of Standards and Technology (NIST)
Department of Commerce National Institute of Standards and Technology (NIST) Response to Request for Information on Quantum Information Science and the Needs of U.S. Industry Posted Date: April 8, 2015
School of Physics and Astronomy FACULTY OF MATHEMATICS AND PHYSICAL SCIENCES. MSc in Quantum Technologies
School of Physics and Astronomy FACULTY OF MATHEMATICS AND PHYSICAL SCIENCES MSc in Quantum The Course The course has been structured to ensure that you are able to concentrate on your own particular areas
Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
Programme Specifications
Programme Specifications MASTER OF RESEARCH: INTEGRATED PHOTONIC AND ELECTRONIC SYSTEMS 1 Awarding body University of Cambridge 2 Teaching institution Department of Engineering 3 Accreditation details
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
Helping your business grow, helping our students achieve
Placement Partnership Schemes Helping your business grow, helping our students achieve Welcome to the As Head of the I truly believe that this is a very exciting time for Swansea University. The future
Taught Postgraduate programmes in the School of Physics and Astronomy
Astrophysics (MSc) Theoretical Physics (MSc) Physics: Advanced Materials (MSc) Physics: Energy and the Environment (MSc) Physics: Global Security (MSc) Physics: Life Sciences (MSc) Physics: Nuclear Technology
Cybersecurity in a Quantum World: will we be ready?
Cybersecurity in a Quantum World: will we be ready? Michele Mosca University Research Chair 3 April 2015 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental
MSc in Computer and Information Security
MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
Information Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
Regional Conference on Factoring in Asia
IFG REGIONAL CONFERENCE: Regional Conference on Factoring in Asia International Conference On Factoring And Other Receivables Finance Products Singapore / Tuesday, 28 October 2014 Factoring continues to
A Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01
2nd Clinical Trials Methodology Conference: Methodology Matters. 18-19 November 2013. www.methodologyconference2013.org.uk
SPONSORSHIP AND EXHIBITION BROCHURE 2nd Clinical Trials Methodology Conference: Methodology Matters 18-19 November 2013 Edinburgh International Conference Centre (EICC) UK 2 nd Clinical Trials Methodology
Project Management Association of Japan (PMAJ) Hosting International Project & Program Management Symposium Tokyo 2008 in March 2008
Project Management Association of Japan (PMAJ) Hosting International Project & Program Management Symposium Tokyo 2008 in March 2008 Project Management Association of Japan (PMAJ) will host the International
BIG PUBLIC INVESTMENTS IN THE CITIES OF AGGLOMERATIONS
INVITATION The Department of Urban and Spatial Planning, Faculty of Architecture, Silesian University of Technology, hereby invites participants to the second edition of the cyclical conference: REGION
CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015
BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting
Programme Specifications
Programme Specifications MASTER OF PHILOSOPHY IN ARCHITECTURE AND URBAN DESIGN (MAUD) 1 Awarding body University of Cambridge 2 Teaching institution Department of Architecture 3 Accreditation details None
The New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
Cyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS. Master Degree Programme Section LM-17
UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS Master Degree Programme Section LM-17 DM 270/2004, art.12 R.D.A. art. 5 1 Art. 1 General rules and objectives
Network Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
THEORETICAL PHYSICS @TCD
THEORETICAL PHYSICS @TCD 1 2 4 3 5 6 TR035 Theoretical Physics String Theory 1 Subatomic Collision at CERN 2 Magnetic Molecules Showing Opposite Spin States 3 Crystal Lattice 4 Foam Structure 5 Cosmic
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Nanoscience Course Descriptions
Nanoscience Course Descriptions NANO*1000 Introduction to Nanoscience This course introduces students to the emerging field of nanoscience. Its representation in popular culture and journalism will be
QUANTUM ENIGMA Summer 2014 Ted McIrvine
QUANTUM ENIGMA Summer 2014 Ted McIrvine June 17: Once Over Lightly & Newtonian Mechanics June 24: Electricity, Magnetism, Light & the Puzzles of 1900 July 1: Atomic Theory, Quantum Theory, Paradoxes and
Authentication in Online Banking Systems through Quantum Cryptography
Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 [email protected], 2 [email protected]
Masters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
THE HISTORY OF MARITIME TECHNOLOGY CONFERENCE 16 18 APRIL 2015, GDAŃSK, POLAND
POLISH NAVAL ACADEMY, FACULTY OF OCEAN ENGINEERING AND SHIP TECHNOLOGY OF GDAŃSK UNIVERSITY OF TECHNOLOGY, INSTITUTE FOR THE HISTORY OF SCIENCE, POLISH ACADEMY OF SCIENCES, NATIONAL MARITIME MUSEUM IN
October 1, 2015. (Press release) Nippon Telegraph and Telephone Corporation
(Press release) October 1, 2015 Nippon Telegraph and Telephone Corporation High-density simultaneous compensation of distortion in wavelength-multiplexed signals using a time-reversal operation: World
NATIONAL CERTIFICATE (VOCATIONAL)
NATIONAL CERTIFICATE (VOCATIONAL) SUBJECT GUIDELINES DATA COMMUNICATION AND NETWORKING NQF Level 4 September 2007 DATA COMMUNICATION AND NETWORKING LEVEL 4 CONTENTS INTRODUCTION 1 DURATION AND TUITION
Quantum communication and quantum computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 30-34 Quantum communication and quantum computing *Sweety Mittal, **Nilesh
Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE
Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Grant Agreement number 611449 Announcement of the Second Competitive
19-23 May 2014, Helsinki, Finland http://cf2014.egi.eu/ EXHIBITION GUIDE
19-23 May 2014, Helsinki, Finland http://cf2014.egi.eu/ EXHIBITION GUIDE The EGI Community Forum 2014 is an excellent opportunity to find out who is who in this exciting field of worldwide distributed
SMART InTeRneT OF ThIngS
Join us at the SMART InTeRneT OF ThIngS SUMMIT 2012 Manchester United FC Conference Centre, Old Trafford, UK Supported by: November 26-28 2012 The European Commission The Institution of Engineering and
THE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES
THE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES The Faculty of Science at the Hebrew University of Jerusalem invites outstanding Bachelor s-degree-level graduates
2015-2016 M.S. IN APPLIED PHYSICS AND COMPUTER SCIENCE
2015-2016 M.S. Dr. David Heddle, Graduate Program Coordinator Luter Hall 309 [email protected] (757) 594-8434 The Master of Science in Applied Physics and Computer Science is built around a core of
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes
WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...
ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION
ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Master of Science and Postgraduate Diploma in Mathematics of Cryptography and Communications. This specification
Director. Waldemar Krawczyk
Director Waldemar Krawczyk Waldemar Krawczyk, born in 1959, is a graduate of the Warsaw University Faculty of Chemistry and postgraduate of Forensic Experts Studies in Szczytno. Krawczyk earned his Ph.D.
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
Programme Specification
LOUGHBOROUGH UNIVERSITY Programme Specification Information Technology & Physics Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing
Practical security of quantum cryptography
Lars Vincent van de Wiel Lydersen Practical security of quantum cryptography Thesis for the degree of Philosophiae Doctor Trondheim, September 2011 Norwegian University of Science and Technology Faculty
Masters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
Second Mares Conference Abstract Submission Guidelines
Second Mares Conference 1. Introduction 2 2. Abstract Submission & Conference Proceedings 2 3. Conference Programme 2 4. How to submit an abstract? 3 5. Oral Presentation Guidelines 4 6. Exhibition Guidelines
Programme Specification and Curriculum Map for MSc Business Information Systems Management
Programme Specification and Curriculum Map for MSc Business Information Systems Management 1. Programme title Business Information Systems Management 2. Awarding institution Middlesex University 3. Teaching
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Faculty of Electronics & Information Technology Warsaw University of Technology. Wszechnica WEiTI
Faculty of Electronics & Information Technology Warsaw University of Technology Wszechnica WEiTI (Popular science lectures on electronics and information technology for high schools) Sławomir Szostak http://wszechnica/elka.pw.edu.pl
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Programme Specification and Curriculum Map for MSc Computer and Network Security
Programme Specification and Curriculum Map for MSc Computer and Network Security 1. Programme title MSc Computer and Network Security 2. Awarding institution Middlesex University 3. Teaching institution
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Research and Development of IP and Optical Networking
: The Future of IP and Optical Networking Research and Development of IP and Optical Networking Kohei Shiomoto, Ichiro Inoue, Ryuichi Matsuzaki, and Eiji Oki Abstract This article presents the targets,
Evaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
XV International Conference on Electron Microscopy
AGH University of Science and Technology International Centre of Electron Microscopy for Materials Science Faculty of Metals Engineering and Industrial Computer Science Polish Society for Microscopy Committee
SUBJECT-SPECIFIC CRITERIA
SUBJECT-SPECIFIC CRITERIA Relating to the accreditation of Bachelor s and Master s degree programmes in electrical engineering and information technology (09 December 2011) The following specifications
The Master s Degree Program in Electrical and Computer Engineering
The Master s Degree Program in Electrical and Computer Engineering M. Lee Edwards and Dexter G. Smith The Master s of Science in Electrical and Computer Engineering, the first Johns Hopkins degree to be
Research on materials as a part of Polish research area
Krzysztof J. Kurzydlowski, Malgorzata Lewandowska Warsaw University of Technology Research on materials as a part of Polish research area History of materials science and engineering in Poland The 1920s
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
