RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

MIPT and SMARTS Quanttelecom: Software and hardware complex of mobile quantum-protected communication

Product
Developers: Moscow Institute of Physics and Technology (MIPT), SMARTS Quanttelecom
Date of the premiere of the system: 2025/06/06
Branches: Information Security,  Telecommunications and Communications
Technology: Information Security - Encryption Tools

Main article: Quantum cryptography (encryption)

2025: Announcement of the development of the software and hardware complex of mobile quantum-protected communication

The software and hardware complex of mobile quantum-protected communications for direct consumers has been developed by scientists. MIPT It includes a device for supplying quantum keys mobile devices and can provide complete protection bank of transactions,, messengers applications against hacking and theft of confidential ones. data The complex does not require complex competencies and equipment and can be used by both the corporation and an ordinary user. This was announced on June 6, 2025 by the press service of MIPT.

As reported, digital reality is dictated cyber threats not only by the use of strong ones cryptographic algorithms to protect professional and personal activities on the network, but also by effective key management. enciphering Traditional approaches based on trust in centralized systems and the human factor no longer provide a sufficient level of security.

{{quote 'author
= explained Alexander Pozdnyakov, co-author of the development, engineer of the radio photonics department of MIPT' Traditional encryption key management systems have a number of vulnerabilities. Human factor: Administrators who can be bribed, cheated or simply made a mistake can have access to keys. Centralization: Keeping keys in one place creates an attractive target for hackers. Complexity: Key management is a complex and time-consuming process that requires highly qualified personnel. Mistakes and omissions are inevitable. Imagine a complex defense system, where each element is flawless, with the exception of one - locks on the gates. If locks are weak or the keys to them are easy to steal, the whole system loses its meaning. The same thing happens in cryptography: even the most powerful encryption algorithms are useless if their control keys are stored insecure or transmitted over unprotected channels.}}

The MIPT development team, in partnership with SMARTS Quanttelecom, has created a prototype mobile non-volatile system for managing cryptographic keys. It is an easy-to-use system for supplying derived cryptographic keys using a random number generator and using quantum communication networks to input derived keys over the NFC interface to mobile devices. Under conditions where trust is a scarce resource, secure automation of the life cycle of cryptographic keys becomes the main element of building reliable security systems.

the process of operation of the device

The main feature of the development is in direct key management by the user without intermediaries.

File:Aquote1.png
The system is a non-volatile key generation and distribution device, capable of interfacing with quantum networks built using CRK (quantum key distribution) technology in the form factor of a small handheld device, recalls the previously well-known pager. This gives constant control over access to the device to the owner, who decides for himself when and why all the keys need to be changed. Technically, the module is connected via an NFC interface to a mobile device, and secure storage is provided inside the mobile device in a special secure software module. Access to key information is provided upon presentation of the PIN-code.

told Dmitry Zaytsev, co-author of the development, head of the radiophotonics department of MIPT
File:Aquote2.png

The work of business applications on ordinary smartphones using the created system takes place in the mode of exchange of protected messages. The use of the complex reduces dependence on information security factors in the company, eliminates the human factor, confidentiality, as well as increases the stability of business processes without expensive organizational and technical measures.