id Quantiques encryption products have attained Common Criteria Evaluation Assurance Level 4 augmented with ALC_FLR.2 (EAL4+).
p>id Quantiques encryption products have attained Common Criteria Evaluation Assurance Level 4 augmented with ALC_FLR.2 (EAL4+).
As a world premiere, this certification also applies when keys are sourced from the company’s quantum key distribution technology. id Quantique commercialises a broad range of layer 2 encryption products to secure Ethernet, Fibre Channel, and SONET/SDH data networks. These products are used by enterprise and government customers worldwide to secure confidential data. In 2008, Common Criteria Evaluation Assurance Level 4 had already been achieved.
Common Criteria evaluation is an international standard for information technology security certification. It was developed through a collaboration of national security and standards organisations to replace national security evaluation criteria. It allows users in the enterprise and government market to assess the security level offered by products. This certification is enhanced from EAL4 to EAL4+ and also covers recent products, including the company’s Fibre Channel and 10G Ethernet Centauris encryptors.
“We consider that Common Criteria certification is essential to guarantee the security of our products” explains Gregoire Ribordy, id Quantique CEO. “It also allows to enhance the trust of our customers in these products.”
This certification round also included testing of the company’s encryptors with encryption keys sourced from quantum key distribution. This new technology exploits the laws of quantum physics to guarantee the security of encryption key exchange. id Quantique jointly developed with the Australian company Senetas a hybrid solution combining conventional encryption and quantum key distribution. For Grégoire Ribordy, “The evaluation of encryption products sourcing keys from quantum key distribution constitutes a world premiere and is an important step toward a larger market adoption of this promising technology. It allows indeed to benchmark the security offered by such a hybrid solution and to make up for the absence of standards for this novel technology.”