Quantum Key Distribution (QKD) Technology

Security through Quantum Physics

QKD leverages the unique properties of quantum physics to distribute encryption keys without fear of an eavesdropper.

Secure Networks Need QKD

Quantum computers are poised to crack current encryption protocols. A new secure communications architecture is required that utilizes QKD.

Why QKD?

Only QKD is provably future-proof against new algorithms or computing advancements. Keys delivered through QKD aren't crackable, because they aren't intercepted!

Space-Based QKD

Encryption keys delivered through satellites provide resiliency against outside tampering for remote and insecure locations anywhere around the globe.

Technology Readiness Level

S15 Space has flight-proven entangled photon sources and Quantum Random Number Generators (QRNG) that fit in a CubeSat.

Learn More

Upon request, S15 Space can provide a White Paper that outlines the technology, use case, and market for QKD. Contact us to learn more!

About Us


S15 Space Systems was spun out of the world-renowned Centre for Quantum Technologies (CQT) in Singapore.
Our mission: commercialize the advanced QKD and quantum communications technology developed over the last two decades at CQT.

News and Events

Conferences 2018

Small Satellite, Logan, Utah, August 4 - 9

Summit for Satellite Financing, Paris, France, September 10 - 13

IAC, Bremen, Germany, October 1 - 5

Satellite Innovation Symposium, Mountain View, CA, October 8 - 11

International Conference on Space Optics, Greece, October 9 - 12

CyberSat, Arlington, VA, November 14 - 16

Who We Are

Chune Yang Lum

CEO and Co-Founder

David Mitlyng

COO

Follow Us:

Twitter: @s15_space

LinkedIn: s15-space-systems

Contact Us:

Email: info@s15.space

 

Frequently Asked Questions

How is quantum communications more secure than regular communications?
A ‘quantum channel’ provides the two communicating users (Alice and Bob) a means to establish shared random numbers with the ability to confirm the absence of eavesdroppers on the channel. These numbers are used to create completely private symmetric encryption keys. Symmetric encryption keys are secure against all forms of computational attacks, including from quantum computers, and are used to encrypt sensitive data that is then sent over conventional data channels.

How does Eve get detected?
There are two unique properties of quantum physics that can be exploited. In the Prepare and Measure protocol, the no-cloning theorem of quantum mechanics ensures that an unknown quantum state cannot be measured (or cloned) without altering that state. In the Entanglement based protocol, states of separate photons are linked together in a combined quantum state so that measurement on one photon disturbs the overall entangled state.

What is the market for quantum-safe communications?
Any group that needs secure communications, including: Banks and financial institutions; Government and Defense agencies; Embassies; Satellite operators; Telecommunication operators; Cybersecurity and quantum computing developers. S15 Space has prepared a White Paper outlining the market and use case for quantum-safe technologies, which can be requested by contacting info@s15.space

What’s the difference between QKD and quantum-safe communications?
QKD is the secure distribution of symmetric encryption keys, and is one application that can allow for quantum-safe communications (defined as communications that is immune to the encryption cracking capability of quantum computers).

Are there other quantum-safe communication options?
Yes, any securely delivered symmetric encryption scheme is likely to be quantum-safe; for example, a USB flash drive physically delivered by a trusted courier. There is also work underway to develop post-quantum cryptography (PQC), with the goal of creating new asymmetric (public-private key) algorithms that cannot be solved by quantum computers. However, PQC standards are still immature, and are not considered future-proof and tamper-proof like QKD.

Why migrate over to QKD when Quantum Computer development is many years away?
If data encrypted with a public RSA key is intercepted today, along with the public key, then that information can be stored and later cracked using Shor’s algorithm as soon as sufficiently powerful quantum computers are available. Estimates range from five to fifteen years from now, as the advancement of new technology, new algorithms and secretly-held developments are hard to predict.

How large is S15 Space Systems?
Incorporated in Singapore in late 2017, S15 Space is in the seed funding stage with six employees, with plans to expand significantly through 2018.

What IP or patents does S15 Space have?
S15 Space has access to relevant patents and IPs developed at CQT, with plans to file more patents in the near future.

What is the core technology developed by S15 Space?
S15 Space is commercializing discrete variable QKD, both weak-coherent-pulse-based (prepare and measure), and entanglement-based, leveraging heritage from CQT.

What is the timeline for developments?
S15 Space Systems is developing increasingly secure encryption hardware devices on a cadence of 18-24 months, with plans to launch demonstration missions in 2019 and 2020.

©Copyright 2018 S-Fifteen Space Systems, Singapore and United States