In a quantum network, routing decisions must account for far more than network state alone. Engineers also need to consider requested entanglement fidelity, the probabilistic nature of swapping operations, and the short coherence times of entangled states. That makes entanglement routing one of the most important challenges in building efficient and reliable quantum networks. In this on-demand webinar, Michael Cubeddu, Co-Founder and CTO at Aliro, walks through the complexities of entanglement routing and what it means for near-term quantum network design. https://hubs.la/Q04c-w7v0 #QuantumNetworking #SecureNetworks
About us
Aliro, The Quantum Networking Company®, offers AliroNet® to run entanglement-based Quantum Networks for applications such as Quantum Secure Communications (QSC), secure access to clouds and data centers, networking of quantum computers, and networking of distributed quantum sensors. AliroNet is also used to implement comprehensive Advanced Secure Networks which include Post-Quantum Cryptography (PQC). Aliro provides quantum network simulation as a professional service or as an on-premises offer. AliroNet® users include utility companies, telecommunications providers, public sector organizations, enterprises, and researchers who are simulating, designing, piloting, orchestrating, and building the world's first quantum networks. Visit us at AliroTech.com.
- Website
-
https://alirotech.com
External link for Aliro
- Industry
- Software Development
- Company size
- 11-50 employees
- Headquarters
- Boston, MA
- Type
- Privately Held
- Founded
- 2019
Locations
-
Primary
Get directions
Boston, MA 02163, US
Employees at Aliro
Updates
-
Our latest blog post explores why GPS can estimate position but cannot verify it, and why that distinction matters for critical infrastructure and secure communications. Quantum Position Verification (QPV) is a physics-based approach to proving that an endpoint is actually where it claims to be. By using quantum information that cannot be copied and relayed like classical data, QPV opens the door to a new form of location authentication. https://hubs.la/Q04cZ8-J0 #QuantumNetworking #SecureNetworks
-
BBM92 is a standard quantum key distribution protocol that uses entanglement. Learn how Alice and Bob share a secret key via entangled photons and why BBM92 is ideal for use in fiber-based networks. Timestamps for this video: 00:03 – What is BBM92 and why it matters 00:35 – Commercially available quantum networking devices 01:08 – Scaling BBM92: trusted relays vs. quantum repeaters #QuantumNetworking #SecureNetworks
-
Quantum computing will challenge the cryptographic foundations that secure today’s networks, including key parts of IPsec. For engineers responsible for protecting data in transit, the question is no longer whether quantum-safe networking matters, but how to begin implementing it in practice. In this on-demand webinar, Bruno Rijsman, Aliro Fellow, walks through the real-world steps for deploying quantum-safe IPsec. This session is designed for engineers who want practical, actionable guidance they can apply directly in their environments. https://hubs.la/Q04c-npm0
-
Governments and organizations around the world are investing in quantum networking technologies to help secure critical communications, strengthen resilience, and maintain a competitive edge. Developing a clear quantum strategy is becoming increasingly important; not only for national security and technological leadership, but also for practical planning around research, partnerships, standards, regulations, and integration with existing infrastructure. This white paper explores how organizations in the US are approaching these challenges and opportunities, including emerging integrated use cases such as free-space quantum secure communications. Proactive engagement today will help determine who is ready to capitalize on the potential of quantum networking tomorrow. https://hubs.la/Q04c-vGX0
-
Classical encryption faces new risks from AI and Quantum Computing. In this video, Brian Doolittle, Quantum Physicist and Simulation Tech Lead at Aliro, compares two solutions: Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). Timestamps for this video: 00:03 – Why we care about QKD 00:43 – PQC vs. QKD: key differences 01:16 – How quantum physics enables secure key sharing 01:46 – Where PQC makes sense today 02:18 – When to use QKD and entanglement-based networks
-
Quantum Secret Sharing (QSS) combines two things security teams want but rarely get together: resilience against compromise and visibility into tampering.This article explains how secret sharing works, why it has long been used for high-assurance security, and how quantum technologies are taking the concept further with quantum-enhanced secret sharing, and true quantum secret sharing. We also share a practical case for how organizations can begin applying quantum-secure methods today without waiting for fully quantum infrastructure everywhere. https://hubs.la/Q04cZ5Pz0 #QuantumNetworking #SecureNetworks
-
As quantum computing advances, organizations need to start preparing for a world where legacy encryption alone may no longer be enough. That’s why Hybrid Classical-Quantum Key Exchange is getting so much attention. By combining classical cryptographic methods with quantum security techniques, this techniqu offers a practical path toward stronger protection for data in transit, while maintaining interoperability with today’s networks and flexibility for the future. This on-demand webinar explores how organizations can begin pursuing quantum-safe security strategies. https://hubs.la/Q04c-0TV0 #QuantumNetworking #SecureNetworks
-
Quantum teleportation allows for the instant transfer of a quantum state without physically moving it. Teleportation is a cornerstone of distributed quantum computing, enabling secure state transfer between QPUs without violating the no-cloning theorem or introducing measurement errors. #QuantumNetworking #SecureNetworks #QPUnetworking
-
In this segment, we explore the processes used to generate entangled photons, focusing on two key methods: Spontaneous Parametric Down Conversion and Spontaneous Four-Wave Mixing. #QuantumNetworking #SecureNetworks