DWDM experts
Over 20 years of experience in Layer 1 and DWDM networks - we know fiber optics down to the last detail.
days
hours
minutes
seconds
Available hardware |
What we do: We rely on the QKD systems of our partners ID Quantique and Quantum Optics Jena. They are linked to your existing hardware (Adtran/Nokia) via recognized standards, protocols and interfaces (e.g. GS ETSI 014). Your benefit: You benefit from mature technology and a high level of compatibility with established market solutions, providing you with investment security. |
Add your content here.
Quantum-safe key infrastructure |
What we do: We analyze your infrastructure and plan the necessary fiber optic connections, including all requirements for the successful use of QKD. This includes interfaces, certificates and other important parameters for smooth operation. Your benefit: You receive uncompromising security against future threats - for the most critical applications as well as for intellectual property/patents, among other things. |
Add your content here.
Integration into your network architecture |
What we do: QKD can be seamlessly integrated into your existing network structure. Our technicians take care of the entire implementation - from conception to installation and ongoing operation. Your benefit: You save time and resources and can rely on a smooth, professional introduction of your QKD solution. |
Add your content here.
QKD detects every eavesdropping attempt in real time, as key transmission is based on quantum mechanics. A compromised key is immediately discarded. This makes subsequent decryption technically impossible.
Add your content here.
As QKD is based on physically based processes, security is maintained even in the event of future technological breakthroughs. This is ideal for data with a long information lifespan.
Add your content here.
QKD systems enable the generation of highly secure keys for a fiber optic link of up to 150 kilometers in length. This makes the technology particularly suitable for data center links and site networking.
Add your content here.
David Haas advises companies, authorities and critical infrastructures on IT security, compliance and post-quantum cryptography. If you want to know when and how you should prepare for the post-quantum era - talk to him!
Quantum Optics Jena is an innovative start-up from Jena that specializes in quantum communication. As a spin-off of the Fraunhofer IOF, the company develops systems for tap-proof data transmission using entangled photons and quantum key distribution (QKD).
Add your content here.
ID Quantique (IDQ) is a Swiss company based in Geneva that has specialized in quantum cryptography since 2001. It is a world leader in the development of quantum secure networks, quantum random number generators and quantum detection systems.
Add your content here.
Visit us at the dacoso CBC in Langen near Frankfurt and experience quantum security up close. We will show you live how Quantum Key Distribution protects your critical data from future threats today.
i
Over 20 years of experience in Layer 1 and DWDM networks - we know fiber optics down to the last detail.
Early specialization in encryption - directly where data is created: on the fiber.
Renowned companies, banks, carriers and public authorities have been relying on our solutions for more than two decades.
From 12 locations in DACH, our service technicians are always quickly on site. Decentralized spare parts warehouses also ensure fast recovery.
We are actively involved in major research projects on quantum-safe communication - and apply this knowledge directly to your solution.
Together with top players in the industry, we set quantum-safe standards for tomorrow.
QKD stands for Quantum Key Distribution - a procedure for secure key transmission based on the laws of quantum mechanics.
QKD uses individual particles of light (photons) to transfer cryptographic keys between two parties. The photons are encoded in specific quantum states. Any attempt to intercept the transmission changes these states measurably - so an attack is detected immediately. After transmission, the key is verified by comparison and error correction and can then be used for encryption.
Because security is not based on mathematical assumptions, but on physical principles: Eavesdropping is not possible without leaving traces.
Especially in areas with the highest security requirements - such as government authorities, banks, critical infrastructure or research facilities.
QKD is based on physical security through quantum mechanics, while PQC (post-quantum cryptography) uses mathematical methods that are also resistant to attacks by quantum computers. PQC can be used flexibly on existing hardware and is suitable for a wide range of applications - QKD, on the other hand, is suitable for particularly critical data.