Hollow Core Fiber Optic Cable Can Transport QKD

Share post:

Hollow core fiber, a new type of optical fiber filled with nothing but thin air, has been found to be effective in carrying out quantum key distribution (QKD).

QKD is a security protocol that is basically not hackable and thus plays a crucial role in protecting sensitive data from increasingly complex cyber-attacks.

According to the researchers, the configuration of the hollow core fibers is more suitable for QKD because it reduces the possibility of different signals interfering with each other and disrupting the entire process.

QKD involves encrypting data into an unreadable message using a cryptography key that the recipient uses to decrypt the information. It works by encoding the cryptography key to a quantum particle known as qubit which is then sent to the other person measuring the qubit to obtain the key value.

To find ways to perform QKD operations, the researchers turned to various approaches, including the use of fiber optic cables to send both the qubits loaded with the cryptography key and the actual encrypted message.

However, the effectiveness of the protocol is limited once the traditional fiber is used.

So, the hollow core fiber is strongly favored, as light signals do not diffuse much in an air-filled channel, as there can be a clear separation between the encrypted data stream and the weak quantum signal carrying the encryption key.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways