The Port of Rotterdam stakeholders will be able to participate and benefit from an untappable, multi-user quantum network for their critical communication systems.
uTech’s spin-off Q*Bird is the first to deploy a new type secure quantum network that can connect multiple users via a center hub in a cost-effective and scalable manner. This will ensure an untappable internet connection between many users, spread out throughout the port area.
Malignant tapping the communication systems between parties can lead to significant financial losses, disruption of critical business operation, or physical harm. A quantum communication infrastructure will insure an untappable connection and will improve the logistics chains of which Rotterdam is a part of, even more so a vital infrastructure on the European continent.
Previously a team of scientists and engineers at QuTech has demonstrated an alternative, untappable method for sending encrypted information. The technology has such commercial potential that they have decided to spin-off out of QuTech under the name of Q*Bird.
Our technology is based on a special implementation of quantum key distribution (QKD) that uses a central hub to connect users that want to exchange secure communications
explains Q*Bird’s co-founder and director Remon Berrevoets.
As a first step, the central hub of the system will be situated at Port of Rotterdam Authority and will connect users at Portbase, and two or three other maritime logistic companies that are based in the port of Rotterdam.
The multi-user capabilities of the central hub allow for later additions of i.e. barges and pilot organization to the network. In due course, other end-users can be connected to the system too, for example: third party customers, suppliers, and emergency services.
Such a setup enables connecting all end-users with a secure, untappable connection. The first four end-users can be expanded later to many more. The users will share keys that are generated using quantum technology that they will use to encrypt messages using traditional technology.
The strength of this type of setup is the ease by which it can be expanded to many more users, and the relative low cost of expansion. Upon completion, Portbase can be sure its communication line hasn’t been tampered with while connecting with, for example, other port authorities.