Patent classifications
H04L9/0852
Combined digital signature algorithms for security against quantum computers
A server can record (i) a first digital signature algorithm with a first certificate, and a corresponding first private key, and (ii) a second digital signature algorithm with a second certificate, and a corresponding second private key. The server can select first data to sign for the first algorithm and the first private key in order to generate a first digital signature. The server can select second data to sign, wherein the second data to sign includes at least the first digital signature. The server can generate a second digital signature for the second data to sign using the second algorithm and the second private key. The server can transmit a message comprising (i) the first and second certificates, and (ii) the first and second digital signatures to a client device. Systems and methods can concurrently support the use of both post-quantum and classical cryptography to enhance security.
Secure distribution of entropy
Techniques are disclosed for securely distributing entropy in a distributed environment. The entropy that is distributed may be quantum entropy that is generated by a quantum entropy generator or source. The true random entropy generated by a trusted entropy generator can be communicated securely among computer systems or hosts using secure communication channels that are set up using a portion of the entropy. The distribution techniques enable computer systems and hosts, which would otherwise not have access to such entropy generated by the trusted entropy source, to have access to the entropy.
PROTOCOL TO INITIATE COMMUNICATION BETWEEN QUANTUM DEVICES CONFIGURED TO SEND OR RECEIVE QUANTUM OBJECTS
Methods for communicating messages encoded in quantum objects comprise exchanging series of values on a classical communication channel between quantum communication devices. Basically, one of the quantum devices discloses a clue on its intention to use a polarization basis for a given quantum object while the other device discloses clue on a basis it will not use in a way similar to the Monty Hall Problem.
Quantum computing machine learning for security threats
Embodiments are disclosed for a method for a security model. The method includes generating a Bloch sphere based on a system information and event management (SIEM) of a security domain and a structured threat information expression trusted automated exchange of indicator information. The method also includes generating a quantum state probabilities matrix based on the Bloch sphere. Further, the method includes training a security threat model to perform security threat classifications based on the quantum state probabilities matrix. Additionally, the method includes performing a machine learning classification of the security domain based on the quantum state probabilities matrix.
Systems and methods for machine learning based optimization of pulse sequences for quantum key distribution
A device may include a processor configured to select a quantum key distribution transmission; identify an optical fiber path via which the quantum key distribution transmission is to be performed; determine one or more values for at least one transmission parameter for the identified optical fiber path; and select a pulse script for the optical fiber path based on the determined one or more values for the at least one transmission parameter. The processor may be further configured to perform the quantum key distribution transmission via the identified optical fiber path using the selected pulse script.
SYSTEM AND METHOD FOR SECURED FREE SPACE OPTICAL TRANSMISSION IN THE MID-INFRARED DOMAIN
A free-space optical communication system includes a transmitter and a receiver, the transmitter being configured to transmit an encrypted message to the receiver at the mid-infrared domain, the transmitter comprising a master mid-infrared optical source configured to generate a mid-infrared signal and a chaos generator configured to generate a chaotic signal by applying external optical feedback to the master mid-infrared optical source, the transmitter being configured to determine an encrypted message from an original message by applying a message encryption technique to the original message and to send the encrypted message to the receiver through an optical isolator, the receiver comprising a slave mid-infrared optical source similar to the master mid-infrared optical source the slave mid-infrared optical source being configured to recover the chaotic signal from the encrypted message by applying chaos synchronization, the receiver further comprising a first detector configured to detect the encrypted message, a second detector configured to detect the chaotic signal, and a message recovery unit configured to recover the original message from the encrypted message detected by the first detector and the chaotic signal detected by the second detector.
Systems and methods for post-quantum cryptography communications channels
Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes transmitting a first portion of an electronic communication to a client device over a non-PQC communications channel. The example method further includes transmitting a second portion of the electronic communication to the client device over a PQC communications channel. In some instances, the first portion of the electronic communication may comprise overhead data, and the second portion of the electronic communication may comprise payload data.
Methods and systems for utilizing hardware-secured receptacle devices
A system for using hardware-secured receptacle devices includes a transfer processing device configured to store transfer method data associated with user on at least a cryptographically secured receptacle device, receive user authentication credentials from a user, authenticate user identity as a function of the user authentication credentials, retrieve a transfer authorization from the at least a cryptographically secured receptacle device as a function of the transfer method data, generate a transfer as a function of the transfer authorization.
QUANTUM TELEPORTATION NETWORK USING A SYSTEM OF ELECTRONICALLY ENABLED GRAPHENE WAVEGUIDES
A system includes N-distant independent plasmonic graphene waveguides. The N-distant independent plasmonic graphene waveguides are used to generate an N-partite continuous variable entangled state.
Secure multi-state quantum key distribution with wavelength division multiplexing
The performance of quantum key distribution by systems and methods that use wavelength division multiplexing and encode information using both wavelength and polarization of photons of two or more wavelengths. Multi-wavelength polarization state encoding schemes allow ternary-coded digits, quaternary-coded digits and higher-radix digits to be represented by single photons. Information expressed in a first radix can be encoded in a higher radix and combined with a string of key values to produce a datastream having all allowed digit values of that radix in a manner that allows eavesdropping to be detected without requiring the sender and receiver to exchange additional information after transmission of the information.