A claimed first-of-a-kind quantum key distribution network offers 800 Gbps encryption under real-world environmental conditions and has been demonstrated to detect and defend against quantum threats. Credit: Sakkmesterke / Getty Images New research has revealed the full viability of a novel quantum key distribution (QKD) network for metropolitan areas that is resistant to quantum computing attacks. According to JPMorgan Chase, Toshiba and Ciena, the newly developed QKD network supports 800 Gbps encryption under real-world environmental conditions and can instantly detect and defend against quantum-enabled threats. In a claimed industry first, the network has also been demonstrated to secure a mission critical blockchain application, the firms stated.Quantum key distribution network “first of its kind”Under the leadership of JPMorgan Chase’s Future Lab for Applied Research and Engineering (FLARE) and global network infrastructure teams, researchers from all three organizations collaborated to achieve the following results: A QKD channel was multiplexed on the same fiber as ultra-high bandwidth 800 Gbps optical channels for the first time and used to provide keys for encryption of the data stream.Co-existence of the quantum channel with two 800 Gbps and eight 100 Gbps channels was demonstrated for a 70km fiber, with a key rate sufficient to support up to 258 AES-256 encrypted channels at a key refresh rate of 1 key/sec.Operation of QKD and the ten high-bandwidth channels was demonstrated for distances up to 100km.The proof-of-concept network infrastructure relied on Toshiba’s Multiplexed QKD System, manufactured by Toshiba Europe at their Cambridge UK base, and Ciena’s Waveserver 5 platform, equipped with 800 Gbps optical-layer encryption and open APIs running over Ciena’s 6500 photonic solution.QKD technology, robust encryption key to securing quantum computing future As the era of quantum computing beckons, QKD is the only solution that has been mathematically proven to defend against a potential quantum computing-based attack with security guarantees based on the laws of quantum physics, said JPMorgan Chase, Toshiba, and Ciena.“This work comes at an important time as we continue to prepare for the introduction of production-quality quantum computers, which will change the security landscape of technologies like blockchain and cryptocurrency in the foreseeable future,” commented Marco Pistoia, distinguished engineer and head of the FLARE research group. Speaking to CSO, Pistoia adds: “The success of this prototype shows that we now have a proven and tested method for defending the confidentiality of applications such as blockchain against future quantum-equipped eavesdroppers.” With QKD technology, organizations can ready themselves for the security needs of the future and will be better prepared to secure their applications against risks that may arise when quantum supremacy is reached, he says.With more sensitive information being distributed across fiber-optic networks every day, robust encryption is of vital importance, said Ciena CTO Steve Alexander. “As the quantum computing era approaches, research and development advances will continue to ensure the confidentiality of critical data as it travels over the network.” Related content interview Strong CIO-CISO relations fuel success at Ally CIO Sathish Muthukrishnan and CISO Donna Hart have forged a partnership steeped in Ally’s culture of radical candor that keeps the financial services firm secure and innovative. By Dan Roberts May 09, 2024 9 mins CIO CSO and CISO IT Leadership news Zscaler shuts down exposed system after rumors of a cyberattack Initially dismissing rumors, Zscaler now says it did have a system exposed but nothing important has been accessed. By Shweta Sharma May 09, 2024 3 mins Data Breach Cyberattacks news Palo Alto launches AI-powered solutions to fight AI-generated cyberthreats The suite is powered by Palo Alto’s proprietary solution, Precision AI, which integrates machine learning, deep learning, and generative AI technologies. By Prasanth Aby Thomas May 09, 2024 3 mins Generative AI Security Software news F5 patches BIG-IP Next Central Manager flaws that could lead to device takeover Two high-risk vulnerabilities could allow attackers to gain full administrative control on devices via leaked password hashes. By Lucian Constantin May 08, 2024 5 mins Threat and Vulnerability Management Cloud Security Vulnerabilities PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe