The free-space quantum key layer for critical networks.
Quantumspace builds free-space QKD links that deliver information-theoretic keys via photons—ground-to-ground today, satellite next.
The risk
Large-scale quantum computers can break today’s public-key crypto. Data stolen now can be decrypted later.
- RSA and ECC fall to Shor’s algorithm.
- Stored traffic becomes plaintext once machines scale.
- Critical links face long data-retention windows.
The answer
Exchange keys guaranteed by physics. QKD detects eavesdropping and yields symmetric keys without hardness assumptions.
- Errors expose interception.
- Reconcile, correct, and compress to secret bits.
- Deliver keys to VPNs, HSMs, or one‑time‑pad workflows.
What we’re exploring
1–5 km. Single/weak-coherent photon tests, link budget, basic sifting. Status: R&D.
Pointing, acquisition, tracking (PAT) and atmospheric compensation concepts for reliable urban links. Status: design/simulation.
Sifting, error correction, privacy amplification; integrations with HSM/VPN/PQC. Status: software prototype.
How it works
We send single photons each carrying a random bit across a free-space optical link. If anyone tries to listen, physics introduces detectable errors. When the line is clean, we fix small errors and hash the data into a secret key. That key plugs into your existing VPN/HSM/one-time pad (OTP).
A very weak laser emits single photons, each carrying a random bit.
The receiver measures each photon using a random basis (setting).
They reveal only their bases—not the bits—and keep the matches. That forms the raw key.
They sample a few bits to estimate errors (QBER). If low, they correct mismatches over an authenticated channel.
They hash the result to strip any leaked information. The final symmetric key feeds VPNs, HSMs, or OTP workflows.
Tamper-evident by physics
Any tap raises the error rate (QBER). If it exceeds the threshold, the session is dropped and no key is produced.
Mini‑glossary
- Photon
- A single particle of light.
- Basis
- The measurement setting used to read a photon.
- Sifting
- Keeping only the bits where bases matched.
- Privacy amplification
- Hashing that removes any eavesdropper’s knowledge.
Use cases
Government & defense backbones
Central banks, exchanges, payment rails
Telco backhaul and data-center interconnects
Cloud/regulator-driven high-assurance networks
Roadmap
Q4 2025
Q4 2025: Lab demo of end-to-end QKD over controlled free-space path.
H1 2026
H1 2026: 1–5 km rooftop ground link with live sifting + key rates.
H2 2026
H2 2026: Urban pilot with partner; integration with HSM/PQC.
2027
2027: Pre-commercial limited deployments; satellite pathfinder planning.