Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Scientists use quantum cryptography to create 'un-crackable' phone security
Monday - 1/23/2012, 8:58am EST
Los Alamos scientists developed the technology after 18 years of research. It uses quantum physics to develop algorithms that no computer can figure out. Until now, quantum cryptography required bulky, rack-mounted computers, plus two data connections to make it all work. But now, Los Alamos engineers have figured out how to fit quantum cryptography onto a device small enough to fit into a cell phone.
During a typical secure phone call, a caller using a smartphone would first be authenticated with a password or other security measures, such as biometrics readings. The caller would then dial the number of a person with a QKarD. If that person is on the caller's nonsecret lookup table, the QKardD utilizes secret keys to establish a secure call. If this is not the case, then the QKarD places a call to a trusted authority using a regular cell call. The QkarD will then use a key to encrypt the key that the authority applies to the phone call.
The new impenetrable line of defense is called QKarD, which stands for Quantum Smart Card. QKarD was designed by Jane Nordholt, Richard Hughes, Raymond Newell and Charles Peterson of LANL's Applied Modern Physics group and Kevin McCabe, Nicholas Dallman, and Kush Tyagi of LANL's Space Instrumentation System group.
QKarD could be used to provide security systems for online transactions, banking, secure facility access, border crossings, electronic voting and digital rights management controls.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.