October 2017. Weve just returned from a security analysis trip to ITMO university in St. Petersburg (press in en | ru). Our lab has previously done informal implementation security audit for commercial quantum cryptosystems from ID Quantique, QuantumCTek, and a prototype at the University of Calgary. Now the Russian subcarrier scheme is added to this list. Note added: the analysis results have been published.
April 2017. In a carefully worded announcement, the Government of Canada indicates that Thomas Jenneweins quantum communication demonstrator satellite has been funded. This may make Canada the second country to develop such satellite (Chinas one is already in orbit). Our group has contributed to Thomas project over the past 4 years, and will try to continue doing so.
February 2017. Having single-photon detectors in space is no easy matter: they suffer from radiation in the solar wind, and gradually break down. See our twopreprints on mitigating radiation damage in avalanche photodiodes that should allow them to survive for several years in orbit.
January 2017. Congratulations to our PhD student Shihan Sajeed for winning an IQC achievement award (top 15% of cohort), given for his work on identifying security flaws and loopholes in practical quantum communication systems and protocols.
September 2014. We congratulate our collaborator Feihu Xu with the Best Student Oral Presentation prize he won at QCrypt 2014. Our group has contributed to the paper he presented at the conference.
February 2014. We have shown that security loopholes in quantum communication systems can be created on-demand, by laser damage. Our article is featured in Physics Synopsys, and on the cover of Physical Review Letters. Read the article (PDF).
August 2013. Huff... QCrypt the 3rd international conference on quantum cryptography, hosted at IQC this year, is over. It was a heavy task for our institute and our students to house it.
January 2013. Our laboratory has been the first at the Institute for Quantum Computing to move to the new Mike & Ophelia Lazaridis Quantum-Nano Centre building. We are located in room QNC 3303 (and will relocate to QNC 3301 once additional construction there is complete, see pictures below). We have to say the building is fantastic, and the wait has been worth it.
shooting bright green alignment beams at each other. The actual quantum states being teleported are carried by red single photons along the same path, and are invisible to the eye. Our labs modest contribution to this experiment was to provide special low-noise single-photon detectors, used in Bob on Tenerife. See press about this experiment.
June 2012. Vadim Makarovs lecture on quantum hacking may be a good introduction to this topic, if you have an hour to watch it:
February 2012. Vadim Makarov and the quantum hacking lab have moved from Norway to the Institute for Quantum Computing (IQC), Waterloo, Canada. Our goal is to create the world first security testing and certification facility for quantum cryptographic equipment. During the first year of operation, experiments were housed in the old IQC building (RAC1), while our permanent 70 m2 laboratory in the brand new Quantum-Nano Centre on the campus of the University of Waterloo was awaiting installation of air conditioners, blackout curtains and shelving:
News below are from labs previous location in Norway.
September 15, 2011. You can watch online Vadim Makarovs talk about loopholes in implementations of quantum cryptography, given at the QCRYPT conference. (Or you can download 418 MiB video of higher quality.)
December 2010. What is the proper way to patch the detector loopholes? We reply to a comment by Yuan et al. from Toshiba Cambridge lab. See also follow-up in the press (the journalist concluded that a light-sabre duel with A. Shields may be necessary to resolve the dispute :). Update: months later, we peacefully continue the discussion.
August 29, 2010. We have hacked commercial quantum key distribution systems from both vendors active on the market today, and published it in Nature Photonics.
This attack on commercial quantum cryptography is
the first 100% efficient one, giving the eavesdropper full secret key with zero disturbance to the system,
the first fully implementable one, using todays technology and off-the-shelf components, and