Boston Electronics
(800)347-5445 or boselec@boselec.com
• SPADs: Single Photon Counting APDs:
Silicon: 350 - 900 nm (VIS)
InGaAs: 900 - 1700 nm (NIR)
Gated and Free-running
TCSPC and Quantum Physics
Correlation Electronics
• Short pulse diode lasers:
1310 and 1550 nm telecom wavelengths
• RNG: random number generators
110100010001110111…
• QKD: quantum key distribution &
encryption systems
From
Boston Electronics Corporation
91 Boylston Street, Brookline, Massachusetts 02445 USA
(800)347-5445 or (617)566-3821 fax (617)731-0935
www.boselec.com
boselec@boselec.com
Page 1
Photon
ing
t Countin
C
for Brainies.
s
0. Preamble
This document gives a general overview on InGaAs/InP, APD based photon counting at telecom
wavelengths. In common language telecom wavelengths are the O band, centered around 1310nm
(1260 to 1360 nm) and the C band, centered around 1550nm (1530 to 1565 nm) where the fibre
attenuation is the lowest. Also the principles of photon counting at visible wavelengths are similar; the
performance are very different. Values for VIS photon counter are given in chapter 10 of this
document.
Page 2
Table of contents
1. Avalanche photodiodes
2. Principle of photon counting
3. Terminology and explanation
4. Analogue versus Geiger mode
5. Free running versus gated mode
6. Effect of deadtime /afterpulsing
7. Nominal versus Effective Gate width
8. Linearity of Detection Probability
9. Photon counting at VIS wavelength
10. Our photon counters products
11. Our other products
12. Remark
Page 3
1. Avalanche photodiodes
In electronics, a diode is a two-terminal electronic component with an asymmetric transfer characteristic, with low (ideally
zero) resistance to current flow in one direction, and high (ideally infinite) resistance in the other. A semiconductor diode,
the most common type today, is a crystalline piece of semiconductor material with a p-n junction connected to two
electrical terminals. The most common function of a diode is to allow an electric current to pass in one direction (called the
diode's forward direction), while blocking current in the opposite direction (the reverse direction).
A photodiode is a type of photodetector capable of converting light into either current or voltage, depending upon the
mode of operation. Photodiodes are similar to regular semiconductor diodes except that they may be either exposed or
packaged with a window or optical fiber connection to allow light to reach the sensitive part of the device. Many diodes
designed for use specifically as a photodiode use a PIN junction rather than a p-n junction, to increase the speed of
response. A photodiode is designed to operate in reverse bias.
An avalanche photodiode (APD) is a highly sensitive semiconductor electronic
device that exploits the photoelectric effect (Figure 1) to convert light to electricity.
APDs can be thought of as photodetectors that provide a built-in first stage of gain
through avalanche multiplication. By applying a high reverse bias voltage, APDs show
an internal current gain effect due to impact ionization (avalanche effect). In general,
the higher the reverse voltage the higher the gain. For APD the reverse voltage is
always below the breakdown voltage and APD are not sensitive enough to detect single
photon
Figure 1
Single-Photon Avalanche Diode (SPAD) (also known as a Geiger-mode APD) identifies a class of solid-state
photodetectors based on a reverse biased p-n junction in which a photo-generated carrier can trigger an avalanche current
due to the impact ionization mechanism. This device is able to detect low intensity signals (down to the single photon).
SPADs, like the avalanche photodiode (APD), exploit the photon-triggered avalanche current of a reverse biased p-n
junction to detect an incident radiation. The fundamental difference between SPAD and APD is that SPADs are specifically
designed to operate with a reverse bias voltage well above the breakdown voltage (on the contrary APDs operate at a bias
lesser than the breakdown voltage). This kind of operation is also called Geiger mode in literature, for the analogy with the
Geiger counter.
2. Principle of photon counting
Figure 2 represents the I-V characteristics of an APD and illustrates
how single-photon sensitivity can be achieved. This mode is also
known as Geiger mode. The APD is biased, with an excess bias
voltage, above the breakdown value VBr and is in a metastable state
(point A). It remains in this state until a primary charge carrier is
created. In this case, the amplification effectively becomes infinite,
and even a single-photon absorption causes an avalanche resulting
in a macroscopic current pulse (point A to B), which can readily be
detected by appropriate electronic circuitry. This circuitry must also
limit the value of the current flowing through the device to prevent
its destruction and quench the avalanche to reset the device (point
B to C). After a certain time, the excess bias voltage is restored
(point C to A) and the APD is again ready to detect a single photon.
The actual value of the breakdown voltage depends on the
semiconductor material, the device structure and the temperature.
For InGaAs/InP APD’s, it is typically around 50V. The detection
efficiency but also the noise of an APD in Geiger mode depends o
n the excess bias voltage.
Above
A
VBr
I
Below
V
C
B
Figure 2
Page 4
3. Terminology and explanation
a) Detection efficiency
The performance of an avalanche photodiode APD in single-photon detection mode is characterized first by its detection
efficiency. This quantity corresponds to the probability for a photon impinging on the photodiode to be detected. The
detection efficiency results from two different factors:
- The probability that a photon is absorbed in the InGaAs layer
- The probability that the photo-generated carrier triggers an avalanche when crossing the multiplication zone
In fiber based photon counter there can be some coupling losses between the fiber and the active area. In order to
compensate this the bias voltage is slightly increase in order to get the same detection efficiency, thus slightly increasing
the dark count rate.
The quantum detection efficiency increases when the excess bias voltage is raised. At 1550 nm, a detection efficiency value
as high as 25% is typical, for an InGaAs/InP photodiode. For InGaAs/InP photon counter modules the detection efficiency
is adjustable.
Example for an InGaAs/InP photodiode
b) Dark counts
In an APD, avalanches are not only caused by the absorption of a photon, but can also be randomly triggered by carriers
generated in thermal, tunnelling or trapping processes taking place in the junction. They cause self triggering effects called
dark counts.
The easiest way to reduce dark counts is to cool the detector. This reduces the occurrence of thermally generated carriers.
At low temperature, dark counts are thus dominated by carriers generated by band to band tunnelling and more importantly
trapped charges (see below). Raising the excess bias voltage increases the occurrence of dark counts, increases the
detection efficiency and decreases the timing jitter. The operation point, in terms of bias voltage, must thus carefully be
selected. In gated mode, one typically quantifies this effect as a dark count probability per nanosecond of gate duration.
Example: Dark counts in [Hz]: 1’350 counts
gate width: 20 [ns]
trigger rate: 10 [MHz]
Dark counts in ns of gate = 2’000 / 20 / 10’000’000 = 6.75E-06
c) Afterpulses
Perhaps the major problem limiting the performance of present InGaAs/InP APD’s is the enhancing of the dark count rate
by so-called afterpulses. This spurious effect arises from the trapping of charge carriers during an avalanche by trap levels
inside the high field region of the junction, where impact ionization occurs. When subsequently released, these trapped
carriers can trigger a so-called afterpulse. The lifetime of the trapped charges is typically a few µs for InGaAs/InP APD’s.
The probability of these events is also proportional to the number of filled traps, which is in turn proportional to the charge
Page 5
crossing the junction in an avalanche before the quenching takes place. The total charge can be limited by ensuring prompt
quenching of the avalanches.
It is also important to note that reducing the operation temperature of the APD increases the lifetime of the
trapped charges. The cooling temperature must thus carefully be chosen to minimize the total dark count probability
(including afterpulses). Although it depends on the counting rate, this optimal temperature is typically around 220 K for
current InGaAs/InP APD’s.
So far, the cure to get rid of the dark count enhancement by afterpulses has been to use the gated mode detection scheme
(see below). If the voltage across the APD is kept below the breakdown voltage for a sufficiently long time interval, longer
than the trap lifetime, between two subsequent gates, trap levels are empty and cannot trigger an avalanche. With typical
trapping time in the µs range for InGaAs/InP APD’s. Using a deadtime to inhibit gates for a time long compared to the
trapped charges lifetime after each avalanche also proves useful. At a trigger rate of 100MHz the time interval between 2
gates is 10ns; so a deadtime of 1us will inhibit the next 100 gates and the maximum counting rate will be limited at 1 MHz.
d) Timing resolution
For many applications, the timing resolution, or jitter, of the detector is also important. Jitter is the undesired deviation
from true periodicity of an assumed periodic signal. It is the time variation of the electric output signal of the detector for a
constant arriving light signal. Timing performance typically improves with an increase of the excess bias voltage. In order
to quantify it, one sends short (shorter than 100 ps) and weak pulses on the detector. The spread of the onset of the
avalanche pulses is then monitored with a time-to-amplitude converter. At a 25% detection efficiency, a timing resolution
of about 200 ps FWHM is typical. In the future, optimisation of the photodiode structure could lead to improvements.
Timing jitter measurement on the InGaAs/InP id210 device
Page 6
4. Analogue versus Geiger mode
a) Avalanche mode (linear modes)
Avalanche photodiodes (APD) are working in so-called analogue mode.
Means the bias-voltage applied on the diode is always below break down voltage.
The output signal is proportional to the incoming light intensity.
APD in analogue mode are NOT sensitive enough to detect single photons.
b) Single photon avalanche mode (Geiger mode)
Our products id100, id210, id220 and id400 are SPAD (=Single Photon Avalanche Diode) based module.
SPAD (Single Photon Avalanche Diode) also called photon counter
They are working in digital mode, also called Geiger mode.
Means the bias-voltage applied on the diode is above breakdown.
When a photon is detected it creates an avalanche which has to be quenched, means the bias-voltage is brought below
breakdown in order to stop (quench) the avalanche and then brought back above break down to make it sensitive
again.
The detector is only sensitive when the bias voltage is above break down.
The output signal is NOT proportional to the incoming light intensity.
SPAD are sensitive enough to detect single photons!!!!!!!!!!
Avalanche mode (linear) vs single photon avalanche mode
Page 7
5. Free running versus gated mode
Free running mode:
Only after an avalanche the bias voltage is for a very short time brought below break down, called dead time, in order to
quench the avalanche.
When the bias voltage is above break down: the APD state is ON. When an avalanche occurs in the APD after detection of
a photon or a dark count, it is sensed by the capture electronics. A pulse of adjustable width is produced on the detection
output of the device and the quenching electronics stops the avalanche. In order to limit afterpulsing, the APD bias voltage
is maintained below breakdown (APD state is OFF) until the end of the dead time.
The free-running mode is very convenient for application where the photon arrival is unknown.
Free-running mode description
Deadtime can be set by the user for InGaAs/InP devices:
• id210 from 1us to 100us.
• id220 from 1us to 25us.
Gated mode:
In order to reduce dark count rate, the APD can be biased above breakdown voltage during a short period of time. This
period of time (=duration) is called the gate and is adjustable in width and frequency. This gate is then periodically
repeated. This is the trigger frequency (external or internal trigger).
The detector is only sensitive during the gates. So, the gated mode is used for applications where the photon arrival is
known and this mode significantly reduces dark count.
A photon won't be detected if there gate is not open OR a deadtime is applied (after a previous detection).
When an avalanche occurs within the gate because of a detection of a photon or a dark count, a pulse of adjustable width is
output at the detection connector. The quenching electronics closes the gate and a dead time can be applied, resulting in one
or more blanked pulses.
Gated mode description
Page 8
Free running versus gated mode
Gated mode
Free running mode
Vbd
Vbd
time
output
time
output
time
time
6. Effect of deadtime /afterpulsing
The deadtime is applied after each detection (real or dark count). If the voltage across the APD is kept below the
breakdown voltage for a sufficiently long time interval, longer than the trap lifetime, trap levels are empty and cannot
trigger an avalanche. The typical trapping time is in the µs range for InGaAs/InP APD’s.
id220: Typical DCR vs deadtime at 10%, 15% and 20% detection efficiencies
When a photon arrives on the InGaAs/InP photodiode and creates an avalanche, a deadtime has to be applied after the
Quenching (stopping the avalanche). Thanks to the deadtime (time while no voltage is applied on the photodiode), the
number of carriers and holes decreases significantly and so it avoid an high afterpulsing probability: if too many carriers
are trapped in the photodiode, when the next gate will be open or when the deadtime ends, a new avalanche will occur and
you will have a count which is an afterpulse (=”noise”).
If you use a short deadtime (or no deadtime), you will have a large amount of afterpulses. Then you can believe that you
have a high count rate and a good quantum efficiency, but this is just some noise.
Page 9
Please see below the shape of the curves “Count rate vs trigger rate” with different deadtimes. Please note that this
measurements were done with ambient light to have a significant number of counts and huge afterpulsing rate.
id210: Number of counts vs Frequency depending on the deadtime in gated mode
Thus you would see clearly the impact of deadtime on afterpulsing rate. As an example, you can clearly see that a 5us
deadtime has a significant effect on the afterpulsing rate when the trigger rate is higher than 1MHz. Let us remind you
kindly that those measurements were done with ambient light to have a significant number of counts and huge afterpulsing
rate; it means that the deadtime reduces the afterpulsing rate but also the number of detections coming from light.
Page 10
7. Nominal versus Effective Gate width
In the timing diagram below, a realistic chronogram is shown taking into account the slew rates of the different electronic
stages (the transit time in the electronic stages are assumed negligible). One can note that the gate control signal width
differs from the gate output signal width. More important, the gate control signal width (the width applied by the user
through the id210 interface) is larger than the effective gate width. The difference decreases when the excess voltage
voltage i.e. the efficiency is raised. Note that this effect can also be seen by building an histogram in memory of the dark
counts using a time-to-digital or time-to-analog converters.
This simplified explanation done, we inform the users that:
- a difference exists between the gate width set through the id210 interface and the effective gate width,
- a setting of a small gate width through the id210 interface may result in a lower peak efficiency than that of the current set
level, even in no efficiency (possible at low excess bias voltage),
- the dark count rate specified for the id210 is fairly evaluated with a measured FWHM effective gate width of 1ns. Indeed,
a dark count rate expressed per ns of the gate control signal width would be significantly underestimated in case of a gate
control signal width greatly larger than the effective gate width.
Note finally that the shrinkage of the effective gate width finds also explanation in the avalanche current build up duration.
high detection efficiency
low detection efficiency
time
time
Gate Control Signal
Gate Control Signal
Gate Output Signal
VAC-APD
Gate Output Signal
Ve
Ve
VAC-APD
VBD
VBD
VDC-APD
VDC-APD
Detection
Count
Rate
Detection
Count
Rate
effect ve gate w dth
effective gate width
Page 11
8. Linearity of Detection Probability
Linearity of Detection Probability
a) Gated mode
When using a photon counter, you can easily saturate the device:
If you use a laser source sending in average 2 photons per pulse you will have a count rate double as if you would send in
average one photon per pulse; this what is called linearity of the photon counters.
If no optical signal is sent on the APD, then the detection rate would be your dark count rate.
Between the saturation region and the dark count rate region, your detector is "linear": the count rate of the detector is
proportional to the number of photons arriving on the APD. Attention: this is valid only if a deadtime is applied (cf
paragraph 6 "Effect of deadtime /afterpulsing").
b) Free-running mode
This will be very similar except that the saturation region is defined by your deadtime:
For a 5us deadtime, the maximum count rate is 1/5us = 200kHz => saturation.
9. Photon counting at VIS wavelength
Silicon devices (for visible wavelength 350-900nm) does
normally not have an adjustable quantum efficiency.
Deadtime is 45ns for the silicon photon counter id100 and
is NOT adjustable.
For silicon devices, the trapping time is in the range of
few tens of nanoseconds and the afterpulsing probability
is low.
Silicon device have a lower jitter, as low as 45ps for the
id100, and works usually in free running mode only.
Detection efficiency for silicon based photon counter
Page 12
10. Our photon counters products
Product & Wavlength id100 (350-900 nm)
range
Si
Diode material
35% @ 500 nm
Quantum Efficiency:
Up to less than 2 Hz
Dark Count Rate:
40 ps
Timing jitter:
Free running mode
Operating mode
id400 (1064 nm)
id210 (900-1700 nm) id220(900-1700 nm)
InGaAsP/InP
InGaAs/InP
InGaAs/InP
Up to 30%
Up to 25%
Up to 20%
150 Hz at 7.5%
SPDE
Typically 300 ps
1.10-5 per gate
1 kHz at 10% SPDE
200 ps
250 ps
Gated or
free running mode
Gated or
free running mode
Free running mode
11. Our other products:
id300 short pulse laser source
Wavelength: 1310nm or 1550nm
Electrical input: NIM, ECL, TTL
Laser: Fabry-Perot or DFB
Pulse duration: < 300ps
Peak power: 1mW
Output power at 1MHz: -35dBm
Max trigger frequency: 500MHz
id300
id800-TDC; time to digital converter
Functionalities:
Time to Digital Converter
Time interval analyser
Coincidence counter
Figures of merits:
8 channel TDC
81ps resolution
count rates up to 12.5 million
Deadtime from 1us to 25us
USB interface
id800-TDC
Clavis2: Quatum Key Distribution (QKD) system for R&D
Applications:
Quantum cryptography research
Implementation of novel protocols
Education and training
Demonstrations and technology evaluation
Clavis 2
Quantis: Physical random number generator exploiting an elementary quantum optics process.
Applications:
Cryptography
Secure printing
Mobile prepaid system
Numerical simulations
Gambling, lotteries
PIN number generation
Statistical research
PCI Express
PCI
USB
OEM
12. Remark
Part of the information have been taken from http://en.wikipedia.org/
/ ID Quantique, March 2013
W
E
N
with NEW devices
and NEW grades
REDEFINING PRECISION
id100 SERIES
SINGLE-PHOTON DETECTORS FOR VISIBLE LIGHT WITH BESTIN-CLASS TIMING ACCURACY
IDQ’s id100 series consists of compact and affordable single-photon detector modules with best-in-class
timing resolution and state-of-the-art dark count rate based on a reliable silicon avalanche photodiode
sensitive in the visible spectral range. The id100 series detectors come as:
free-space modules, the id100-20 and
photosensitive area,
id100-50 with a 20 m and respectively a 50 m diameter
fiber-coupled modules, the id100-SMF20, id100-MMF50 and the id100-MMF100 coming with a standard
FC/PC optical input.
The modules are available in three dark count grades, with dark count rate as low as 2Hz.
With a timing resolution as low as 40ps and a remarkably short dead time of 45ns, these modules outperform
existing commercial detectors in all applications requiring single-photon detection with high timing accuracy
and stability up to count rates of at least 10MHz.
K EY FEATURES
APPLICATIONS
Best-in-class timing resolution (40ps)
Time correlated single photon counting (TCSPC)
Low dead time (45ns)
Fluorescence and luminescence detection
Small IRF shift at high count rates
Single molecule detection, DNA sequencing
Standard and Ultra-Low Noise grades
Fluorescence correlation spectroscopy
Peak photon detection at
Flow cytometry, spectrophotometry
= 500nm
Active area diameter of 20 m or 50 m
Quantum cryptography, quantum optics
Free-space or fiber coupling
Laser scanning microscopy
Not damaged by strong illumination
Adaptive optics
No bistability
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
SPECIFICATIONS
1 Timing Resolution
Parameter
Min
Wavelength range
350
2
1
40
Single-photon detection probability (SPDE)
Units
900
nm
60
ps
50k
15
18
%
at 500nm
30
35
%
at 600nm
20
25
%
at 700nm
15
18
%
at 800nm
5
7
%
at 900nm
3
4
%
4
5
Output pulse width
5
Output pulse amplitude
Deadtime
5
3
3
%
9
10
15
ns
1.5
2
2.5
V
45
50
ns
6
7
Maximum count rate (pulsed light)
Supply voltage
20
5.6
4
Supply current
60k
3
at 400nm
Afterpulsing probability
70k
Storage temperature
Counts [Hz]
1
Max
10k
0
0.0
150
mA
70
°C
20k
5
s
10k
W
NE
4 Afterpulsing
< 200Hz
W
NE
< 60Hz
< 2Hz
< 200Hz
< 80Hz
< 20Hz
5 Output Pulse
7
Autocorrelation Function
30k
0
00
05
1.0
1.5
2.0
2.5
6
5
Extremely low shift of instrument response function with
output count rate (less than 70ps from 10kHz to 8MHz).
3 Photon Detection Probability versus
30
25
20
15
10
5
0
400
4
500
3
600
700
800
Wavelength [nm]
10ns
2
6 Dead Time
1
1
10
100
1000
Time [ s]
Typical autocorrelation function of a constant laser
signal, recorded at a count rate of 10kHz.
Typical pulse of 2V amplitude and 10ns width observed at
the output of an id100 terminated with 50 load.
Recommended trigger level: 1V. For timing applications,
triggering on rising edge is recommended to take full
advantage of the detector´s timing resolution.
1
Optimal timing resolution is obtained when incoming
photons are focused on the photosensitive area.
4
Universal network adapter provided (110/220V).
2
The id100 is free of indicating LEDs to maintain
complete darkness during measurements.
5
See on page 4 the A PPI D pulse shaper for
negative input equipment compatibility.
3
The detector output is designed to avoid distorsion
and ringing when driving a 50 load.
6
The id100 SMF20 contains a single mode fiber optimized to
your operating wavelength
W
NE
7
The id100 MMF50 contains a 50/125 m multi mode fiber
optimized for visible spectral range with 0.22 numerical
aperture. The coupling efficiency is larger than 80%.
hold-off time
dead time
10ns
Measurement obtained with an
oscilloscope in infinite persistance mode:
the dead time consists of the output pulse
width and the hold off time during which
The id100 MMF100 contains a 100/140 m multi mode fiber
optimized for visible spectral range with 0.22 numerical
W aperture. The coupling efficiency is larger than 50%.
NE
8
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
3.0
Time [ns]
35
8
0
0.1
3.0
40k
100
Ultra-Low Noise
2.5
50k
V
Standard
20
60k
MHz
Regular
15
70k
Photon Detection Probability [%]
7
8
TE cooled
yes
yes
yes
yes
yes
10
2 IRF Shift with Output Count Rate
Dark count rate: IDQ´s modules are available in three grades: Regular, Standard and
Ultra-Low Noise, depending on dark count rate specifications.
Active Area Diameter
20 m
W
6
NE
50 m
05
Time [ns]
6.5
-40
FWHM Timing Resolution 40ps
30k
6
Cooling time
id100-20
id100-SMF20
id100-50
id100-MMF50
id100-MMF100
40k
20k
Counts [Hz]
Timing resolution [FWHM]
Typical
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
900
(in mm)
id100-SMF20 Front View
id100-MMF50 Front View
id100-MMF100 Front View
id100-20 / id100-50 Front View
C-MOUNT
O1inch-32threads/inch
C-MOUNT adapter
FC/PC connector
39 0 +/- 0 5
39 0 +/- 0 5
C-MOUNT
20 m or 50 m active area
20ns
61 0 +/- 0 5
61.0 +/- 0.5
87.0 +/- 0.5
The short dead time of the id100 allows
operation at very high repetition frequencies,
up to 20MHz.
87.0 +/- 0.5
id100-SMF20 Top View
id100-MMF50 Top View
id100-MMF100 Top View
id100-20 / id100-50 Top View
FC/PC connector
C-MOUNT adapter
79.0 +/- 0.5
MOUNTING OPTIONS
8.0 +/- 0.2
127 3 +/-0 5
57 0 +/-0 5
8.0 +/- 0.2
80 0 +/- 0 5
The id100 series comes with different
mounting options:
Use mounting brackets supplied with the
module using screws with diameters up
to 4mm.
Use a standard optical post holder (not
supplied)using the M4 thread located on
the bottom side of the id100-20 & id10050 detectors.
Use the C-MOUNT adapter to add optical
elements in front of the detector (id10020 & id100-50 only).
4 0 + -0 5
4.0 +/-0.5
79.0 +/- 0.5
+
+
151 1 +/- 0 5
DIMENSIONAL OUTLINE
7 Maximum Count Rate - Pulsed Light
id100-20 / id100-50 Bottom View
PRINCIPLE OF OPERATION
The id100 consists of an avalanche
photodiode (APD) and an active quenching
circuit integrated on the same silicon chip.
The chip is mounted on a thermo-electric
cooler and packaged in a standard TO5
header with a transparent window cap. A
thermistor is used to measure temperature.
The APD is operated in Geiger mode, i.e.
biased above breakdown voltage. A high
voltage supply used to bias the diode is
provided by a DC/DC converter. The
quenching circuit is supplied with +5V. The
module output pulse indicates the arrival of
a photon with high timing resolution. The
pulse is shaped using a hold-off time circuit
and sent to a 50 output driver. All internal
settings are preset for optimal operation at
room temperature.
+
+
M4
+
+
BLOCK DIAGRAM
+6V
Input Filter
&
Linear
Regulator
TO5 header
+5V
R(T)
DC
DC
SMB jack
(female)
2V
10ns
Temperature
Controller
TEC
Quenching
Circuit
Detection
50W
Output
Driver
Hold-off
Time
Circuit
High Voltage Supply
In the fiber-coupled version, a fiber pigtail
with FC/PC connector is coupled to the
detector.
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
Chip
APD
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
ACCESSORY - OPTIONAL PULSE SHAPER
IDQ provides as an option a pulse shaper (A-PPI-D)
which can be used with equipments requiring
negative input pulses. The id100 output pulse leading
edge is converted in a sharp negative pulse of typical
amplitudes 1.4V in 50 load and 2.5V in high
impedance load. The pulse shaper is delivered with
two SMA/BNC adapters.
Typical output pulse of an id100 equipped Typical output pulse of an id100 equipped with a
A PPI D pulse shaper in high impedance load.
with a A PPI D pulse shaper in 50 load.
id101 SERIES - THE WORLD´S SMALLEST PHOTON COUNTER
For large-volume OEM applications, IDQ offers the id101 series, consisting of a standard
TO5 - 8pins optoelectronic package with a CMOS silicon chip (single photon avalanche
diode and fast active quenching circuit) mounted on top of a thermoelectric cooler. A
thermistor is available for temperature monitoring and control. An evaluation board is
available upon request. When properly biased, the performance is comparable with that of
the id100-50. IDQ's engineering team offers technical support to simplify integration. A fiber
coupled version, the id101-MMF50, is also available. See the id101 datasheet for more
information.
OTHER PRODUCTS
id101
id110
id150
id210
id220
id300
id400
Quantis
Clavis2
Cerberis
Centauris
Arcis
Miniature single-photon detector for the visible spectral range (see above)
Single-photon detection system for visible wavelength operating in gated mode
Monolithic linear array of single-photon detectors for the visible range
Single-photon detection system for telecom wavelengths
Free-running single photon detection module - Near infrared range
Short pulse laser source
Single photon counting module for the 900-1150nm spectral range
Quantum Random Number Generator
Quantum Key Distribution System for R&D
Layer 2 encryptor with Quantum Key Distribution
Layer 2 encryptor
Adjustable bandwidth encryptors which offer multi-layer (L3, L4) encryption
SUPPLIED ACCESSORIES
Mounting brackets (4x)
C-Mount adapter (except for fiber couple devices)
Coaxial cable (1m, BNC-SMB)
Power supply with universal input plugs
Operating guide
Angled 2.5mm hexagonal key to remove C-Mount adapter
Angled T10 Torx key to remove mounting brackets
C-MOUNT
fiber coupled version:
id100 MMF50
ORDERING INFORMATION
id100-20-XXX
id100-50-XXX
id100-SMF20-XXX
id100-MMF50-XXX
id100-MMF100-XXX
Photon counter with 20 m active area.
Photon counter with 50 m active area.
Photon counter with singlemode f ber pigtail (FC/PC connector).
Photon counter with multimode f ber pigtail (50/125 m, FC/PC connector).
Photon counter with multimode f ber pigtail (100/140 m, FC/PC connector).
free space version:
id100 20 & id100 50
Select dark count grade:
XXX = REG for Regular; STD for Standard; ULN for Ultra-Low Noise.
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2005-2011 ID Quantique SA - All rights reserved - id100 v4.1 - Specifications as of November 2011
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
Boston Electronics
(800)347-5445 or boselec@boselec.com
REDEFINING PRECISION
id101 SERIES
MIN
NIATU
URE
E PHOTON
N COUN
NTER
R FOR
R OEM
M APP
PLICAT
TIONS
Intended for large-volume OEM applications, the id101 is the smallest, most reliable and most
efficient single photon detector on the market. It consists of a CMOS (Complementary Metal
Oxide Semiconductor) silicon chip packaged in a standard TO5-8pin header with a transparent
window cap. The chip combines either a 20μm (id101-20) or a 50μm diameter (id101-50) singlephoton avalanche diode and a fast active quenching circuit, which guarantees a dead time of less
than 50ns. The chip is mounted on top of a single-stage thermoelectric cooler (TEC). A fibercoupled version, the id101-MMF50, is also available. The maximum photon detection probability
is measured in the blue spectral range (35% at 500nm). An outstanding timing resolution of less
than 60ps allows high accuracy measurements. The performance of the id101 detectors is
comparable to that of the id100-20 and id100-50 modules.
The id101 can be mounted on a printed circuit board and integrated in apparatuses such as
spectrometers or microscopes. The module is used in biological/chemical instrumentation,
quantum optics, aerospace and defense applications.
Contrary to legacy photomultiplier tubes (PMTs) and other silicon-based counters manufactured
tor is fabricated using a qualified commercial
with non-standard custom process, the id101 detector
CMOS process, which guarantees high reliability.
K EY
Y FEA
ATUR
RES
A PPLICA
ATION
NS
Best-in-class timing resolution (40ps)
Time correlated single photon counting (TCSPC)
Low dead time (45ns)
Fluorescence and luminescence detection
Small IRF shift at high count rates
Single molecule detection, DNA sequencing
Peak photon detection at λ = 500nm
Fluorescence correlation spectroscopy
Active area diameter of 20μm or 50μm
Flow cytometry, spectrophotometry
Free-space or multimode fiber coupling
Quantum cryptography, quantum optics
Not damaged by strong illumination
Laser scanning microscopy
Integrated thermoelectric cooler and thermistor
Adaptive optics
ID Quan
n tique SA
1227 Carouge/Geneva
T +41 22 301 83 71
info@idquantique.com
om
Boston Electronics
PR
RINC
CIP
PLE OF OP
PERA
ATION
(800)347-5445 or boselec@boselec.com
B LOCK
K DIAGRAM
2
The id101 is based on a 0.8x0.8mm CMOS silicon chip
containing a 20μm or 50μm diameter avalanche diode and
its active quenching circuit. To operate in the Geiger mode,
the diode anode is biased with a negative voltage Vop. The
cathode is linked to VDD through a polysilicon resistor Rq.
Before the photon arrival, the switch is open (nonconducting) and the cathode is at VDD. When a photon
strikes the diode, the voltage drop induced on the cathode is
sensed by the sensing circuit. The output pin OUT switches
to VDD. The feedback circuit closes the switch: the diode is
biased below its breakdown voltage resulting in the
avalanche quenching. The diode is then kept below
breakdown and the recharge takes place with the opening of
the switch. The full cycle is defined as the sensor dead time.
In any single photon avalanche diode, thermally generated
carriers induce false counts, called dark counts. A singlestage thermoelectric cooler (TEC) allows to cool the device
to reduce the dark count rate. Furthermore, the photon
detection probability in a single photon avalanche diode is
dependent on the excess bias voltage above breakdown.
The breakdown voltage being temperature dependent, it is
often crucial to keep the sensor at a constant temperature.
The thermistor included in the id101 allows one to
implement a temperature control circuit.
VDD
Rq
sensing
circuit
output
driver
OUT
GND
VOP
TEC
TEC(-)
TEC(+)
R(T)
THERM
M(2)
DIM
MEN
NSIONA
A L OU
UTLIN
NE (in mm) AND
D PINO
OUT
thermistor
single-stagg e TEC
THERM(1)
silicon chip including
the single photon avalanche
photodiode and the active
quenching circuit
∅ 20.0
+/-0.5
id1001-MM
MF50 fibeer-coo upll edd version
feedback
circuit
TO
O5 - 8 pins header
50.0
FC
C/PC
connector
∅ 91
∅ 8 33
- Window material: glass
- Pin material: gold plated
- The 20μm or 50μm active area is aligned with the centre
of the glass window. The positioning accuracy is +/100microns.
IID
D Quantique SA
1227 Carouge/Geneva
1.9
6.6
c onnectio
on
VOP
VDD
thermistor
thermistor
GND
OUT
TEC(-)
TEC(+)
+/ 0 1
+/-0.2
pin #
1
2
3
4
5
6
7
8
+/ 0 1
+/-0.2
multimode fiber
typ.length=150mm
0.6 +/-0.1
TO5 fibb er pigtail
∅ 0.43
+/ 0 05
T +41 22 301 83 71
UNIT: millimeters
info@idquantique.com
Boston Electronics
(800)347-5445 or boselec@boselec.com
SP
PECIFICA
ATION
NS
1 Timing Resoll ution
Paramett er
Wavelength range
Active area diameter
Min
350
Typii cal
Maxx
900
Unii ts
nm
70k
60k
20
μm
50k
50
40
μm
ps
40k
1
15
30
20
15
5
3
18
35
25
18
7
4
%
%
%
%
%
%
FWHM
M Timingg Resolutionn 40ps
30k
20k
10k
0
0.0
0.5
1.0
1.5
2.0
2.5
3.0
Timee [ns]
2 Photon Detectt ion Probability versus λ
30
40
4b
50
300
3
Hz
Hz
%
40
50
ns
ns
V
mA
35
45
VDD
4
Photon Detection Probability [%]
35
15
100
30
25
20
15
10
5
0
400
500
600
700
800
900
Wavelengthh [nm]
30
40
35
45
40
50
ns
ns
5.0
28
22
5.2
2.2
-26
MHz
MHz
V
mA
V
100
μA
70
°C
3 A fterpulsing
8
7
4.8
0.25
-24
Current on VOP
Storage temperature
60
-40
Autocorrelation Function
id101-50
Timing resolution [FWHM] 1
Single-photon detection probability (SPDE) 2
at 400nm
at 500nm
at 600nm
at 700nm
at 800nm
at 900nm
Dark count rate (DCR)
id101-20
id101-50
Afterpulsing probability 3
Output pulse width
id101-20
4a 5a
id101-50 and id101-MMF50 4b 5b
Output pulse amplitude (in high impedance) 4a
Output driver capability
Deadtime
id101-20
id101-50 and id101-MMF50
Maximum count rate (pulsed light)
id101-20
6a
id101-50 and id101-MMF50 6b
VDD supply voltage
Current on VDD
VOP supply voltage
Counts [Hz]
id101-20
6
5
4
3
2
1
0
0.1
1
10
100
1000
Tii mee [ μs]
1 The id101-MMF50 comes with a 50/125μm multimode fiber pigtail
with a 0.22 numerical aperture. The overall coupling efficiency
exceeds 80%.
Typical autocorrelation function of a
constant laser signal, recorded at a
count rate of 10kHz.
THER
RMOELECTRIC CO
OOLER SPECIFICA
ATION
NS
Parameter
Resistance ACR
Unit
Value (conditions)
Ω
3.56 +/- 0.16 (at Tr=300K)
Maximum Current Imax
A
0.4 +/- 0.02 (at ΔTmax)
Maximum Voltage Drop Umax
V
1.35 +/- 0.07 (at ΔTmax)
Maximum Delta-T Δtmax
K
67.0 +/- 2.0 (Vacuum, Q=0, Tr=300K)
Maximum Cooling Capacity Qmax
W
0.29 +/- 0.01 (at ΔT=0)
THERMO
OSEN
NSOR SPECIFICA
ATION
NS
Parameter
MOUN
NTIN
NG DETA
A ILS
Unit
Value (conditions)
TEC mounting
Resistance R0
kΩ
2.2 +/- 0.16 at 293K
Thermosensor mounting
Beta Constant β
K1
2918.9 +/- 5%
Wire mounting
soldering, 117°C
epoxy glue
soldering, 183°C
The thermistor resistance can be calculated by:
RT = R293K*exp(β(293-T)/(293*T))
IID
D Quantique SA
1227 Carouge/Geneva
T +41 22 301 83 71
info@idquantique.com
Boston Electronics
(800)347-5445 or boselec@boselec.com
10nn s
1V
10ns
10ns
1V
1V
4a
5a
6a
10nn s
1V
10ns
10ns
1V
1V
4b
5b
Typical pulses observed at the id101-20
(4a) and id101-50 or id101-MMF50 (4b)
outputs in high impedance.
6b
Extended pulses observed at the id101-20
(5a) and id101-50 or id101-MMF50 (5b)
outputs at high illumination level. When an
avalanche is triggered during the recharge
process, the output remains high, giving
an extended pulse. This effect leads to a
decrease of the output count rate.
The short dead time of the id101
allows operation at very high
repetition frequencies, up to 28MHz
for the id101-20 (6a) and 22MHz for
the id101-50 or id101-MMF50 (6b).
id1001-EV
VA EV
VALUATION
N BO
OARD
An evaluation board has been developed for
preliminary optical and electrical testing of the
id101. The id101 under test can be plugged into a
socket intended for TO5 headers. The evaluation
board comes with a power supply with universal
range of input plugs and a 1m coaxial cable
ended with a BNC connector.
APPLICA
ATIO
ON EX
XAMPLE - COMBINA
ATION
N IN
N ARRAY
Electronic Circuits foo r:
-power supply
-outpp ut driveer
-temperature c ontrol
Many industrial applications would greatly benefit
from a single photon detector array. When the
required array size is reasonably small (i.e. <
10x10), it is possible to assemble several closely
spaced TO5 headers to form an array. As
illustrated in the figure, opposite, for a 3x3 array,
several TO headers can be mounted on a printed
circuit board. The minimum center-to-center pitch
is 9.5 mm. Common electronic circuits for power
supply, output stage and temperature control can
be implemented on the PCB. If a high accuracy
for the distance from pixel to pixel is required or if
a large array is needed, IDQ offers a custom
design service for the design of an applicationspecific CMOS chip.
IID
D Quantique SA
1227 Carouge/Geneva
T +41 22 301 83 71
info@idquantique.com
Boston Electronics
(800)347-5445 or boselec@boselec.com
TY
YPICA
A L A PPLICA
ATION
N CIRCUIT
Power Stage
The id101 requires two power supplies, VDD and VOP. A standard inverting DC/DC converter can convert the +5V level
to the high negative voltage level VOP. The remaining electronic circuits on the PCB board can be supplied with the
same +5V power. Two 100nF capacitances must be added as close as possible to the output pins for decoupling
purpose.
Outp
p ut Stage
The id101 output can be shaped for the back-end electronic circuits (e.g. counter, TDC, TAC) using the circuit shown
below. A D-type Flip-Flop with asynchroneous clear combined with a delay generator (RC for instance) and an inverter
with a Schmitt trigger input allows to set the pulse width and the dead time.
Temperature Control
For proper operation, it is highly recommended to implement a thermal stabilisation circuit on the final printed circuit
board, using the single-stage TEC and the 2.2kΩ thermistor provided. Integrated temperature controllers for Peltier
modules are commercially available.
VDD
+5V
feedback
circuit
Rq
sensing
circuit
inverting
DC/DC
converter
1
output
driver
C
CP
OUT
1
GND
D
Q
delay
OUT
VOP
TEC
TEC(-)
TEC(+)
+5V
TH
HERM
M(2)
THE
ERM(1)
R(T)
temperature
controller
A CCESSORY
Y - OP
PTIONA
A L PULSE SHAP
PER
IDQ provides as an option a pulse shaper (APPI-D) which can be used with equipments
requiring negative input pulses. The id100
output pulse leading edge is converted in a
sharp negative pulse of typical amplitudes
1.4V in 50Ω load and 2.5V in high impedance
load. The pulse shaper is delivered with two
SMA/BNC adapters.
IID
D Quantique SA
Typical output pulse of an id100 equipped Typical output pulse of an id100 equipped with a
A-PPI-D pulse shaper in high impedance load.
with aA-PPI-D pulse shaper in 50Ω load.
1227 Carouge/Geneva
T +41 22 301 83 71
info@idquantique.com
W
E
N
REDEFINING PRECISION
id110 - VIS - GATED
GATED VISIBLE SINGLE PHOTON DETECTOR
AR
Y
avalanche signal (also called post-gating), the
id110 operates in real GATED MODE and offers
the best discrimination performance. The figure
below shows the detection rate after sending an
intense light pulse on the APD (1000 photons) at
100kHz repetition rate. The extra-noise originated
by the strong pulses in free-running mode (due to
afterpulsing effect) is larger than the one in gated
mode (due to charge persistence) whereas the
noise level is higher in free-running mode.
Additionnaly, in gated mode, the APD is NOT
blinded.
K EY FEATURES
la ser pulse
1 00 00 00
10 00 00
APD w orkin g in ga ted mo de ( 20 ns
p ulse w idth)
APD w orkin g in fr ee -runn ing m od e
(70 ns de ad t im e & 10n s co incid ence
p ulse w idth)
1 00 00
C ou nt (Hz)
LI
M
IN
The id110 brings a major breakthrough for single
photon detection at visible wavelengths in
demanding conditions. Conventional singlephoton detectors based on Silicon Avalanche
Photodiodes (APD) are typically operated in freerunning mode. Their performance can be strongly
impacted by intense optical pulses. The detector
is blinded by the intense pulse due to the deadtime effect occurring after each detection. This
deadtime can extend to 100's of ns. In addition,
the charges trapped in the APD junction, as a
result of intense optical pulses, increase the noise
level, potentially masking the signal of interest.
The id110 Gated Visible Single Photon Detector
brings a solution to these problems by operating
the APD in GATED MODE. The bias voltage is
kept below breakdown to deactivate the detector
and enhance trap discharge, except when
detection is specifically enabled. Contrary to other
products on the market, which simulate GATED
MODE by controlling the activation of the output
10 00
1 00
10
1
0 .1
1 00
10 00
1 00 00
D elay ( ns)
PR
E
Up to 100MHz external / internal gating frequency
Free gating mode
Adjustable photon detection probability
Adjustable delays, gate width and deadtime
Universal Inputs/Outputs
Two-channel auxiliary event counter
Auxiliary coincidence counter
APPLICATIONS
Setup storage in internal memory
Quantum optics
Real time statistics, charts, sound alarms
Quantum memory
Optical tomography
Data export through USB memory
Photoluminescence
Ethernet remote control (Option)
Fluorescence, fluorescence life time
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
1
The System hardware
The system hardware allows the id110 to operate in free-running, free-gating, internal gated or external gated modes.
Internal-gating mode:
RY
The APD is biased above breakdown during gates of adjustable width and frequency. Internal gating is a
synchronous mode based on a clock provided by the internal clock generator. The 50% duty cycle clock signal is
available at the clock output and counted by the HF clock counter. A user-adjustable trigger delay can be set between
the clock and the gate signals. A gate of width set by the user is opened on the rising edge of the delayed trigger. An
avalanche event within the gate increments the HF detection counter and causes a pulse of adjustable width at
detection1 and detection2 connectors. The quenching electronics closes the gate and, if selected by the user, a dead
time is applied resulting in one or several blanked pulses after a detection.
Internal gated mode
1/Internal Gating Frequency
Clock Output
Dead Time
Trigger Delay
Gate Width
n
bla
Gate Output
k ed
g at
e
Quenching
Width Detection 1&2
Detection 1&2 Outputs
+1
HF Clock Counter
+1
+1
+1
+1
+1
LI
M
HF Gate Counter
+1
+1
HF Detection Counter
External-gating mode:
The operation in external gating mode is very similar to the internal gating mode except that the clock is provided by the
user at the trigger input.
External gated mode
Trigger Input
Dead Time
Trigger Delay
at
dg
e
nke
Gate Width
bla
Gate Output
Quenching
Width Detection 1&2
Detection 1&2 Outputs
HF Clock Counter
HF Gate Counter
+1
+1
+1
+1
+1
+1
+1
HF Detection Counter
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
+1
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
2
Free-gating mode:
The user supplies an electrical signal at the reset/enable input. When no avalanche occurs, the gate output that
reflects the APD state (On/Off) is identical to the reset/enable input signal. When an avalanche occurs during a gate, a
pulse of adjustable width is produced at detection1 and detection2 outputs, the HF detection counter is incremented
and the quenching electronics stops the gate. When a dead time is applied for limiting the afterpulsing, the gate signal
remains at low level whatever the reset/enable state. This results in blanked gate(s) or partially blanked gates. The HF
gate counter provides the effective gates rate applied to the APD.
Y
Free-gating mode
Reset/Enable Input
Dead Time
d
bla
Gate Output
n
g at
k ed
nke
e
Quenching
lly
g at
Quenching
e
tia
p ar
bla
Quenching
Width Detection 1&2
Detection 1&2 Outputs
+1
+1
+1
+1
HF Detection Counter
+1
IN
HF Gate Counter
+1
Free-running mode (asynchronous mode):
+1
LI
M
Until photon absorption or dark count generation, the APD is biased above its breakdown voltage in Geiger mode. The
gate output that reflects the APD state (i.e. On:photosensitive or Off:blind) is at high level. When an avalanche takes
place in the APD, it is sensed by the capture electronics. A pulse of adjustable width is produced on detection1 and
detection2 outputs, the detection HF counter is incremented and the quenching electronics stops the avalanche. To
limit afterpulsing, the APD is maintained below breakdown until the end of the dead time. In this mode, the HF gate
counter and HF detection counter rates are equal.
Free-running mode (asynchronous)
Dead Time
Gate Output
Quenching
Quenching
Quenching
Width Detection 1&2
Detection 1&2 Outputs
+1
HF Gate Counter
+1
+1
+1
+1
P
HF Detection Counter
+1
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
3
SPECIFICATIONS
Parameter
Min
Wavelength range
350
Optical fiber type
Typical
Max
Units
900
nm
1
versus l
MMF (diam. 105 um)
Single-photon detection probability (SPDE)
1
at 405nm
13
%
at 530nm
24
%
at 590nm
24
%
at 660nm
17
%
at 850nm
4
Deadtime range
0.070
%
100
us
200
ps
10
2
External trigger frequency
ns
AR
Deadtime step
Timing resolution at max. efficiency (25%)
100
Internal trigger frequency
Photon Detection Probability
MHz
1,2,5,10,20,50,100,200,500 kHz 1,2,5,10,20,50,100 MHz
Effective gate width range
0.5
Gate width step
25
ns
10
Trigger delay range
ps
20
Trigger delay resolution
10
Calibrated at l
=530 nm.
ps
FC/APC
IN
Optical connector
2
ns
Probability of dark count rate at 530nm for a 1ns effective gate width in gated mode:
Freq.=100kHz, 70ns deadtime
10% efficiency
20% efficiency
10% efficiency
20% efficiency
0.1Hz
0.25Hz
100Hz
250Hz
id110-MMF105
LI
M
Model
Freq.=100MHz, deadtime=1m
s
SUPPLIED ACCESSORIES
Power Cable
Optical fiber cleaner
User guide on USB key
1m FC/APC patch cord MMF105
Compact USB keyboard
Ethernet cable (optional)
ORDERING INFORMATION
module with multimode fibre input (core diameter 105um)
100MHz internal / external trigger rate
PR
E
id110-MMF105-100MHz
OTHER SCIENTIFIC INSTRUMENTATION PRODUCTS
id100: Photon counter module in the VIS spectrum
id150: Miniature 8-channel photon counter for OEM applications in the VIS spectrum
id400: Single photon detection system for 1064nm (900 to 1150nm)
id210: Single photon detection system - Telecom wavelength
id220: Free-running single photon detection module - Near infrared
id300: Short-pulse laser source at 1310nm or 1550nm
id800: 8 channel Time to Digital Converter TDC
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2013 D Quantique SA - All rights reserved - id110 v2013 04 24 - Specifications as of April 24 2013
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
4
W
E
N
REDEFINING PRECISION
Single Photon Counter Visible
AR
Y
Large active area 500um - High Quantum
Efficiency at 650nm and at 800nm
IDQ’s id100 series consists of compact and affordable single-photon detector modules based on a reliable
silicon avalanche photodiode sensitive in the visible spectral range. Up to now, the id100 series was limited to
detectors with high efficiency values in the green region (around 500nm). The two new detectors of id100
series have high efficiency values in the red region of the visible spectrum and ultra high active area. These
new detectors come as :
free-space module, passive quenching, maximal efficiency value around 650nm
free-space module, passive quenching, maximal efficiency value around 800nm
KEY FEATURES
LI
M
IN
Those two detection modules are highly versatile thanks to an USB connexion and a Labview interface
allowing the user to change the bias voltage and the temperature of the diode. The modules are equiped of a
dual universal output signal port which can be set through the software interface. The modules are compatible
with the C-mount, SM1 and cage technologies from Thorlabs. This allows an easy coupling of the light beam
onto the active area of the detectors.
One module optimized around 650nm
One module optimized around 800nm
Tunable efficiency
Tunable temperature of the diode
Adjustable deadtime
Universal dual output
PR
E
Labview interface
C-mount, SM1, cage compatible
APPLICATIONS
Time correlated single photon counting (TCSPC)
Fluorescence and luminescence detection
Single molecule detection, DNA sequencing
Fluorescence correlation spectroscopy
Spectrophotometry
Laser scanning microscopy
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
SPECIFICATIONS
The id120 is a versatile device allowing you to adjust the excess bias, the deadtime and the temperature. Please note that the
values in the specification table are dependent on the user-defined parameters. To have a fair overview of the specifications,
it is recommended to carefully review the curves «Efficiency vs excess bias» and «Dark count rate vs temperature».
ID120-500-800nm
ID120-500-650nm
Parameter
Min
Wavelength range
350
Active area
Typical
Max
Min
1000
350
Typical
Max
Units
1000
nm
500
500
um
Single-photon detection probability (SPDE)
at 650nm (at max. excess bias)
1
at 800nm (at max. excess bias)
60
1
40
55
%
80
%
Dark Count Rate
Down to
500
Timing resolution [FWHM]
200
1000
Hz
1000
1
NIM & LVTTL & Variable
40
1 Efficiency versus Excess Bias @ 655nm
2 id120-500-650nm:
Dark count rate versus temperature
1227 Carouge/Geneva
Switzerland
40
70
ns
70
1 Efficiency versus Excess Bias @ 808nm
3 id210-500-800nm:
Dark count rate versus temperature
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
ps
us
100
100
Storage temperature
3
400
1
Output pulse width
ID Quantique SA
Chemin de la Marbrerie 3
3000
200
NIM & LVTTL & Variable
Deadtime
Output pulse
400
2
°C
REDEFINING PRECISION
id150 SERIES
MINIATURE 8-CHANNEL PHOTON COUNTER
FOR OEM APPLICATIONS
The id150-1x8 is the only multichannel solid-state single photon detector on the market. It
consists of a CMOS silicon chip packaged in a standard TO8-16pin header with a transparent
window cap. The chip combines 8 in-line single photon avalanche diodes that can be accessed
simultaneously for parallel processing. The square diodes are 40x40μm in area with a center-tocenter pitch of 60μm . A fast active quenching circuit is integrated within each pixel in order to
operate each diode in photon counting regime. The chip is mounted on a printed circuit board on
top of a single-stage thermoelectric cooler (TEC). A thermistor can be used to measure the
temperature of the chip. Two power supplies (+5V and -25V) are sufficient for operation in photon
counting mode. The fast active quenching circuit leads to a dead time of less than 50ns per
channel. An outstanding timing resolution of less than 60ps allows high accuracy measurements.
The id150-1x8 can be mounted on a printed circuit board and integrated in apparatus such as
spectrometers or microscopes. The module is used in biological/chemical instrumentation,
quantum optics, aerospace and defense applications. The small detector size is ideal for portable
device applications.
Contrary to legacy photomultiplier tubes (PMTs) and other silicon-based counters manufactured
with non-standard custom process, the id150-1x8 is fabricated using a qualified commercial
CMOS process, which guarantees high reliability.
KEY FEATURES
APPLICATIONS
High-throughput single molecule detection
1x8 linear array with independent outputs
Pixel active area of 40x40μm
2
Parallel DNA sequencing
Center-to-center pitch of 60μm
Multi-Channel TCSPC
Best-in-class timing resolution (40ps)
Fluorescence and luminescence detection
Low dead time (45ns) and dark count rate
Decay and multiple decay time measurements
Peak photon detection at λ = 500nm
Fluorescence correlation spectroscopy
No crosstalk
Flow cytometry, spectrophotometry
Not damaged by strong illumination
Quantum optics
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
PRINCIPLE OF OPERATION
LINEAR ARRAY PICTURE
2
The id150-1x8 is based on a 1.2x1.4mm CMOS silicon chip
containing 8 in-line independent single photon detectors.
Each pixel combines a square avalanche photodiode of
40x40μm2 area and its active quenching circuit. The pixel
center-to-center pitch is 60μm (fill factor exceeds 75%).
To operate in the Geiger mode, each diode anode is biased
with a negative voltage. In the id150-1x8, the cathode of
pixels 1, 3, 5 and 7 are connected together to Vop1 pad,
while the cathode of pixels 2, 4, 6 and 8 are connected to
Vop2 pad. Each cathode is linked to VDD through a
polysilicon resistor Rq. Prior to the detection of a photon on a
pixel, the switch is open (non-conducting) and the cathode is
at VDD. When a photon strikes the diode, the voltage drop
induced on the cathode is sensed by the active quenching
circuit. The corresponding output pin OUTi switches to VDD.
The feedback circuit closes the switch: the diode is biased
below its breakdown voltage resulting in the avalanche
quenching. The diode is then kept below breakdown and the
recharge takes place with the opening of the switch. The full
cycle is defined as the pixel dead time.
In any single photon avalanche diode, thermally generated
carriers induce false counts, called dark counts. A singlestage thermoelectric cooler (TEC) allows one to cool the
device to reduce the dark count rate. Furthermore, the
photon detection probability in a single photon avalanche
diode depends on the excess bias voltage.
active quenching circuits
1x8 SPAD array
1 2 3 4 5 6 7 8
active quenching circuits
The breakdown voltage being temperature
dependent, it is often crucial to keep the sensor at a
constant temperature. The thermistor included in the
id150-1x8 allows one to implement a temperature
control circuit. For efficient cooling, an additional
heat-sink combined with a air fan must be added by
the user. The heat-sink can either surround the TO8
header or be fixed using the UNC 4-40 thread.
BLOCK DIAGRAM
OUT1
OUT2
OUT3
OUT4
OUT5
OUT6
OUT7
OUT8
VDD
Rq
Rq
AQC
Rq
AQC
Rq
AQC
Rq
Rq
AQC
AQC
Rq
AQC
Rq
AQC
AQC
GND
VOP1
VOP2
TEC
TEC(-)
TEC(+)
R(T)
THERM(2)
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
THERM(1)
info@idquantique.com
www.idquantique.com
com
SPECIFICATIONS
1 Timing Resolution
Min
Wavelength range
350
Pixel active area
Center-to-center pitch
Timing resolution [FWHM]
1
Single-photon detection probability (SPDE)
Typical
Max
Units
900
nm
40x40
μm
60k
60
40
μm
ps
50k
60
2
at 400nm
15
18
%
at 500nm
30
35
%
at 600nm
20
25
%
at 700nm
15
18
%
at 800nm
5
7
%
at 900nm
3
4
%
FWHM Timing Resolution 40ps
30k
20k
0
0.0
0.5
1.0
1.5
2.0
2.5
3.0
Time [ns]
1
DCR / channel
15
kHz
Mean DCR over the 8 channels
3.5
kHz
Afterpulsing probability
40k
10k
3
Output pulse width
40
Output pulse amplitude (in high impedance)
45
3
%
50
ns
VDD
Output driver capability
4
Deadtime
VDD supply voltage
VOP supply voltage
4.8
-24
Storage temperature
-40
5.0
2 IRF Shift with Output Count Rate
70k
60k
V
50k
mA
40k
50
ns
5.2
-26
V
V
70
°C
Counts [Hz]
Dark count rate (DCR)
70k
Counts [Hz]
Parameter
30k
20k
10k
0
0.0
0.5
1.0
1.5
2.0
2.5
3.0
Time [ns]
3 Afterpulsing
Measured at 273K with VOP = -25.5V
8
7
Autocorrelation Function
1
6
5
4
3
2
1
0
0.1
1
10
100
1000
Time [μs]
Typical autocorrelation function of a
constant laser signal, recorded at a
count rate of 10kHz.
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
DIMENSIONAL OUTLINE (in mm) AND PINOUT
TO8 - 16pins header
8
7
6
9
4
10
3
11
2
12
1
TOP VIEW
+/ 0 2
∅ 15.3
+/ 0 2
∅ 14.0
+/ 0 2
printed circuit board
glued on top of a 1-stage TEC
- Window material: glass
- Pin material: gold plated
9.50 +/-0.25
1.50 +/-0.30
0.25 +/-0.15
0.88 +/-0.15
13 14 15 16
∅ 11.1
connection
TEC(-)
thermistor
thermistor
TEC(+)
OUT8
OUT6
OUT4
OUT2
VOP2
VDD
GND
VOP1
OUT1
OUT3
OUT5
OUT7
pin #
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
silicon chip including
8 single photon avalanche diodes
and active quenching circuits
5
Recommended Footprint
∅ 0.43
+/ 0 05
1.90
6.50
> 3.0
9.50
0.70
THERMOELECTRIC COOLER SPECIFICATIONS
Parameter
3.50
UNC4-40
Unit
THERMOSENSOR SPECIFICATIONS
Value (conditions)
Parameter
Unit
Value (conditions)
Maximum Current Imax
A
1.15 +/- 0.02 (at ΔTmax)
Resistance R0
kΩ
2.2 +/- 0.16 at 293K
Maximum Voltage Drop Umax
V
2.90 +/- 0.07 (at ΔTmax)
Beta Constant β
K1
2918.9 +/- 5%
Maximum Delta-T Δtmax
K
69.0 +/- 2.0 (Vacuum, Q=0, Tr=300K)
Maximum Cooling Capacity Qmax
W
1.85 +/- 0.01 (at ΔT=0)
The thermistor resistance can be calculated by:
RT = R293K*exp(β(293-T)/(293*T)
MOUNTING DETAILS
TEC mounting
Thermosensor mounting
Wire mounting
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
soldering, 117°C
epoxy glue
soldering, 183°C
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
ACCESSORIES
To accelerate integration of the id150-1x8 in an optical set-up, the following accessories are available.
id150-1x8-TM option:
The id150-1x8-TM consists of a id150-1x8 welded on a
47.8mmx36.8mm printed circuit board. Required decoupling
capacitances are mounted on the PCB bottom side, close to id150-1x8
pins. A heat sink is glued around the id150-1x8 TO8 package. Electrical
connections are provided by 4 straight pin headers. Each 4-poles header
consists of 0.63mmx0.63mm gold-plated pins with 2.54mm pitch. The
recommended footprint and pinout are given below.
unit: millimeters
47.8
45.3
27.7
25.2
22.6
20 1
9
8
7
6
5
3
11
2
12
1
3 14 15 16
Vop1
GND
VDD
Vop2
4
10
36 8
34 3
22 3
19.7
17.2
TEC(-)
thermistor
thermistor
TEC(+)
2.4
14.6
OUT7
OUT5
OUT3
OUT1
2.4
3.5
1.2 [16x]
OUT8
OUT6
OUT4
OUT2
id150-1x8-TM
id150-1x8-TM recommended footprint
id150-1x8-TM pinout
The outputs are provided at SMB-type connectors. For Vop, GND, VDD,
OUT1
OUT3
OUT7
The id150-1x8-TM is provided with the id150-1x8-EVA evaluation board
of 66mmx107mm in size. The id150-1x8-TM is inserted on the id1501x8-EVA board using four 4-poles sockets. Assembly marks ensure a
proper insertion.
OUT5
id150-1x8-EVA option:
TEC(-)
TEC(+), TEC(-) and thermistor, 4mm banana connectors are used.
thermistor
The bias voltages Vop1 and Vop2 can be disconnected by removing the
thermistor
Vop1&2
GND
VDD
TEC(+)
corresponding jumpers .
id150-1x8-EVA
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
OUT2
OUT4
OUT6
OUT8
Vop1 & Vop2 jumpers
assembly marks
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
REDEFINING PRECISION
id210
ADVANCED SYSTEM FOR SINGLE PHOTON DETECTION
The id210 brings a major breakthrough for single photon detection at telecom wavelengths. Its
performance in high-speed gating at internal or external frequencies up to 100MHz by far surpasses the
performance of existing detectors and of its predecessor, the id200-id201, that has been used by
researchers around the globe since first launched in 2002. Photons can be detected with probability up to
25% at 1550nm, while maintaining low dark count rate. A timing resolution lower than 200ps can be
achieved. The id210 provides adjustable delays, adjustable gate duration from 0.5ns to 25ns and adjustable
deadtime up to 100us. For applications requiring an asynchronous detection scheme, the id210 can operate
in free-running mode with detection probability up to 10%. Beside performance, a particular effort has been
made for providing a practical user interface, universal compatibility with scientific equipment, applicationoriented functionalities including statistics and coincidence counting. Built around an advanced embeddedPC and FPGA, the id210 allows remote control, connection of external screen and keyboard, data export on
USB key and setups saving.
KEY FEATURES
Up to 100MHz external / internal gating frequency
Asynchronous detection mode (free-running)
Free gating mode
Adjustable photon detection probability
Adjustable delays, gate width and deadtime
Universal Inputs/Outputs
Two-channel auxiliary event counter
APPLICATIONS
Auxiliary coincidence counter
Quantum optics, quantum cryptography
Setup storage in internal memory
Fiber optics characterization
Real time statistics, sound alarms
Single-photon source characterization
5.7" VGA TFT-LED color display
Failure analysis of electronic circuits
Data export through USB memory
Eye-safe Laser Ranging (LIDAR)
VGA HD15 output for external monitor / projector
Spectroscopy, Raman spectroscopy
Ethernet remote control (or USB with adapter)
Stand alone application and Labview Vi
Photoluminescence
Singlet oxygen measurement
SMF or MMF optical input
Fluorescence, fluorescence life time
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
co
1
Block Diagram
BLOCK DIAGRAM
Threshold
Trigger
Relay
Trigger
High Level
Clock
Internal Clock Generator
Comp.
Trigger
Coupling
Trigger
Slope/Logic
Trigger
Logic
Clock
Frequency
50W
Trigger
Input
HF Clock
Counter
Pulse Shaping
Trigger
Trigger
Delay
Load
Gate
Width
Mode
Trigger input block
HF Gate
Counter
Dead
Time
DC High / Free-running
DC Low / Disabled
Internal
Reset
Mode
Threshold
Clock output block
High Level
Gate
Reset/Enable
Comp.
R/E
Slope/Logic
Pulse ID
Reset
Mode
Reset/Enable input block
Pulse ID
Mode
Buffer
Gate
Gate
Output
50W
Low Level
Gate
HF Counter
Detection
Reset
Internal
Reset
Polarization
Reset/Enable
Logic
Gate
Reset/Enable
50W
Relay
Reset/Enable
Clock
Output
50W
Internal
Reset
Polarization
Trigger
Reset/Enable
Input
Buffer
Clock
Low Level
Clock
Load
System hardware
Gate output block
Threshold
Aux1
Comp.
Aux1
Relay
Aux1
Slope/Logic
Aux1
Pulse Shaping
Aux1
50W
Aux1
Input
HF Counter
Aux1
High Level
Detection1
Pulser
Electronics
Internal
Reset
Width
Detection1
Logic
Detection1
Buffer
Detection 1
Detection 1
Output
50W
Low Level
Detection1
Load
Pulse Shaping
Aux1&Aux2
Polarization
Aux1
HF Counter
Aux1&Aux2
Cooled
APD
Aux1 input block
Quenching
Electronics
Detection 1 output block
Internal
Reset
Threshold
Aux2
Comp.
Aux2
Relay
Aux2
Slope/Logic
Aux2
50W
Aux2
Input
Pulse Shaping
Aux2
HF Counter
Aux2
Capture
Electronics
Internal
Reset
APD bias control
Efficiency
Optical
Input
Polarization
Aux2
Aux2 input block
2-channel event counter / coincidence counter
cooled APD & associated electronic
HF Detection
Counter
HF Counter
Detection
Reset
High Level
Detection2
Width
Detection2
Logic
Detection2
Buffer
Detection2
Detection 2
Output
50W
Low Level
Detection2
Load
Detection 2 output block
PRINCIPLE OF OPERATION
The id210 Advanced System for Single Photon Detection is built around the following blocks:
Trigger, Reset/Enable, Aux1 and Aux2 inputs blocks with SMA connectors on the id210 front panel.
Through the id210 user interface, each input can be set independently for receiving LVTTL-LVCMOS, NIM, NECL,
PECL3.3V or PECL5V signals. A VAR mode is also provided with a large input voltage range, an adjustable threshold
and slope/logic definition. AC/DC coupling selection is possible for the Trigger input. (see Inputs Specifications on
page 6 for more details).
Clock, Gate, Detection1 and Detection2 outputs blocks with SMA connectors on the id210 front panel.
Through the id210 user interface, each output can be set independently for providing LVTTL-LVCMOS, NIM, NECL,
PECL3.3V or PECL5V signals. The user can also switch to VAR mode in which the pulse width, the logic definition, the
high and low signal levels and the load can be adjusted. (see Outputs Specifications on page 6 for more details).
an avalanche photodiode and associated electronics.The key component at the heart of the id210 is a
cooled InGaAs fiber-coupled avalanche photodiode (APD). The fiber (single mode or multi-mode) is connectorized to a
FC/PC connector on the id210 front panel. The APD terminals are connected to:
- a DC high voltage controlled by the system to reach the efficiency set through the id210 interface,
- a Pulser Electronics that produces constant amplitude pulses for operation in single photon regime.
ID Quantique SA
Chemin
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
2
The Capture Electronics detects the avalanche events (resulting from photon absorption or dark generation) and feeds
the Detection 1&2 outputs blocks and the HF (high frequency) detection counter. The Quenching Electronics inhibits
the pulser until avalanche quenching.
the System hardware
The system hardware allows the id210 operation in internal gated, external gated, free-running or free-gating modes.
Internal-gating mode:
The APD is biased above breakdown during gates of adjustable Width and Frequency. Internal gating is a synchronous
mode based on a clock provided by the internal clock generator. The 50% duty cycle clock signal is available at the
Clock Output and counted by the HF Clock Counter. A user-adjustable Trigger Delay can be set between the Clock and
the Gate signals. A gate of Width set by user is open on the rising edge of the delayed trigger. As consequence of an
avalanche event within the gate, the HF Detection Counter is incremented and a pulse of adjustable Width is outputted
at Detection1 and Detection2 connectors. The Quenching Electronics closes the gate and, if selected by the user, a
Dead Time is applied resulting in one or several blanked pulses after a detection.
The HF Gate Counter provides an exact count of the effective gates seen by the APD.
Internal gated mode
1/Internal Gating Frequency
Clock Output
Dead Time
Trigger Delay
ate
dg
nke
Gate Width
bla
Gate Output
Quenching
Width Detection 1&2
Detection 1&2 Outputs
+1
HF Clock Counter
+1
+1
HF Gate Counter
+1
+1
+1
+1
+1
HF Detection Counter
External-gating mode:
The operation in external gating mode is very similar to the internal gating mode except that the clock is provided by the
user at the Trigger input.
External gated mode
Trigger Input
Dead Time
Trigger Delay
ate
dg
nke
Gate Width
bla
Gate Output
Quenching
Width Detection 1&2
Detection 1&2 Outputs
HF Clock Counter
HF Gate Counter
+1
+1
+1
+1
+1
+1
+1
HF Detection Counter
ID Quantique SA
Chemin
in de la Marbrerie 3
+1
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
3
W
Free-running mode (asynchronous mode): NE
A DC control signal travels through multiplexers and the Dead Time stage and sets the Pulser Electronics to High. Until
photon absorption or dark count generation, the APD is biased above its breakdown voltage in Geiger mode. The Gate
Output that reflects the APD state (i.e. On:photosensitive or Off:blind) is at high level. When an avalanche takes place in
the APD, it is sensed by the Capture Electronics. A pulse of adjustable Width is produced on Detection1 and Detection2
outputs, the Detection HF Counter is incremented and the Quenching Electronics stops the avalanche. For limiting
afterpulsing, the APD is maintained below breakdown until the end of the Dead Time. In this mode, the HF Gate Counter
and HF Detection Counter rates are equal.
Free-running mode (asynchronous)
Dead Time
Gate Output
Quenching
Quenching
Quenching
Width Detection 1&2
Detection 1&2 Outputs
+1
HF Gate Counter
HF Detection Counter
+1
+1
+1
+1
+1
W
Free-gating mode: NE
The user feeds an electrical signal at the Reset/Enable input. The signal, after transit in the input block, passes through
multiplexers and the Dead Time stage. When no avalanche occurs, the Gate Output that reflects the APD state (On/Off)
is identical to the Reset/Enable input signal. When an avalanche occurs during a gate, a pulse of adjustable Width is
produced at Detection1 and Detection2 outputs, the Detection HF Counter is incremented and the Quenching
Electronics stops the gate. When a Dead Time is applied for limiting the afterpulsing, the Gate signal remains at low
level whatever the Reset/Enable state. This results in blanked gate(s) or partially blanked gates. The HF Gate Counter
provides the effective gates rate applied to the APD.
Free-gating mode
Reset/Enable Input
Dead Time
e
d
nke
gat
bla
Gate Output
Quenching
ked
lan
yb
tiall
ar
te p
ga
Quenching
Quenching
Width Detection 1&2
Detection 1&2 Outputs
HF Gate Counter
HF Detection Counter
+1
+1
+1
+1
+1
+1
+1
A two-channel event counter and a coincidence counter as an auxiliary independent block.
The signals outputted by Aux1 and Aux2
inputs blocks feed HF Counter Aux1 and HF
Counter Aux2 after pulse shaping. The block
also performs a logic AND of the two inputs
that feeds a coincidence counter: HF Counter
Aux1&Aux2.
Aux1 Input
Aux2 Input
Aux1&Aux2
HF Counter Aux1
HF Counter Aux2
HF Counter Aux1&Aux2
ID Quantique SA
Chemin
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
+1
+1
+1
+1
+1
+1
+1
+1
+1
+1
+1
T +41 22 301 83 71
F +41 22 301 83 79
+1
+1
+1
+1
info@idquantique.com
www.idquantique.com
com
4
SPECIFICATIONS
Parameter
Min
Wavelength range
900
Optical fiber type
Typical
Max
Units
1700
nm
1
SMF or MMF
Efficiency range (except free-running mode)
Efficiency range in free-running mode
5
1 1
4
3
25
2
2.5
%
%
Deadtime range
0.1
Deadtime step
100
us
200
ps
100
MHz
100
Timing resolution at max. efficiency (25%)
2
External trigger frequency
Internal trigger frequency
30
2.5
ns
1,2,5,10,20,50,100,200,500 kHz 1,2,5,10,20,50,100 MHz
Effective gate width range
0.5
Gate width resolution
25
ns
20
ns
10
Trigger delay range
Trigger delay resolution
+10
Dimensions LxWXH
Optical connector
0
900
kg
230
VAC
Cooling time
7
InGaAs/InP APD
1000
1100
1200
1300
1400
1500
1600
1700
Wavelength [nm]
mm
8.2
10%
5
FC/PC
110
10
°C
387x256x167
Power supply
15
ps
+30
Weight
20
ps
10
Operating temperature
25%
25
Efficiency [%]
Efficiency resolution (all modes)
10
Calibrated at l
=1550nm
1
Efficiency versus wavelength at 10% and 25% levels (l
=1550nm)
4
30% Quantum Efficiency at 1550 nm version available on request
(Dark Count Rate to be discussed)
min
Telcordia GR-468-CORE
2
A 20MHz trigger rate limited version is also available. The id210 can be later on remotely upgraded to 100MHz.
3
A version of the id210 without free-running mode is also available.
IDQ´s SMF modules are available in three grades: Standard (STD) and Ultra-Low Noise (ULN) and Ultra-Ultra Low Noise
(UULN), depending on dark count rate specifications.
Dark count rate for a 1ns effective gate width in gated mode:
Freq.=100kHz, no deadtime
Freq.=100MHz, deadtime=10m
s
10% efficiency
25% efficiency
id210-SMF-A
0.4Hz
2Hz
id210-SMF-B
1Hz
id210-SMF-C
id210-MMF
Model
10% efficiency
25% efficiency
0.4kHz
2kHz
5Hz
1kHz
5kHz
6Hz
30Hz
6kHz
30kHz
8Hz
40Hz
8kHz
40kHz
4
4
Dark count rate (maximum values) in free-running mode with 50m
s deadtime:
2.5% efficiency
5% efficiency
7.5% efficiency
10% efficiency
id210-SMF-A
1kHz
1.5kHz
2.2kHz
3kHz
id210-SMF-B
1kHz
1.5kHz
2.2kHz
3kHz
id210-SMF-C
6.5kHz
9kHz
11.5kHz
13.5kHz
id210-MMF
7.5kHz
10kHz
12.5kHz
14.5kHz
Model
ID Quantique SA
Chemin
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
Note that the effective gate
width is evaluated by
measuring the full width at
half-maximum of the
histogram of time interval
between the gate signal (start) and the
detection signal (stop) in the dark. This
provides a true evaluation of the dark
count rate in contrast with dark count rate
assessment based on the gate electrical
signal. To take into account the electrical
signal width always leads to a huge
underestimation of the DCR.
Please contact IDQ for more details about
the assessment of the dark count rate in
gated mode.
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
5
Block Diagram
INPUTS SPECIFICATIONS
Parameter
Min
Typical
Frequency (Aux1, Aux2)
Frequency (Reset/Enable, Trigger)
Pulse duration
500
Voltage range in VAR mode
-2.5
Max
Units
300
MHz
100
MHz
ps
+2.5
Impedance
V
50
Pulse amplitude
1
For NECL, PECL3.3V and PECL5V, the id210 input
provides standard termination scheme (NECL: 50W
to -2V,
PECL3.3V: 50W
to +1.3V, PECL5V: 50W
to +3V).
W
+0.1
+5
Coupling (Trigger)
2
The Inputs parameters or Predefined Standards are
included in setup files that can be saved on internal memory.
V
DC or AC
Coupling (Aux1, Aux2, Reset/Enable)
DC
Threshold voltage range in VAR mode
-2.5
+2.5
Threshold voltage resolution in VAR mode
1
Predefined standards
V
+10
2
mV
LVTTL/LVCMOS - NIM - NECL - PECL3.3V - PECL5V
Connectors
SMA
Protection
ESD
OUTPUTS SPECIFICATIONS
Parameter
Min
High level voltage range (high Z to ground)
High level voltage range (50W
to ground)
Low level voltage range (high Z to ground)
Low level voltage range (50W
to ground)
Voltage swing (high Z to ground)
Voltage swing (50W
to ground)
1
3
1
3
2
4
Typical
-2.0
Max
Units
+7.0
V
-1.0
+3.5
V
-3.0
+5.0
V
-1.5
+2.5
V
+0.1
+7.0
V
+3.5
V
+0.05
Logic
1
Starting with a Predefined Standard, all the parameters
can be modified by the user.
2
The Outputs parameters or Predefined Standards are
included in setup files that can be saved on internal memory.
+ or -
Short pulse width (Detection1, Detection2)
4.5
5
5.5
ns
Large pulse width (Detection1, Detection2)
90
100
110
ns
Rise/fall times at 5V swing (10%-90%)
1
Predefined standards
2.5
2
ns
LVTTL/LVCMOS - NIM - NECL - PECL3.3V - PECL5V
Connectors
SMA
Protection
ESD
High level [V]
+ 10
High Z to ground
+ 7
Max.
Voltage swing [V]
High level [V]
Voltage swing [V]
+ 4
High Z to ground
50W
to ground
Max.
+ 9
+ 6
+ 3
+ 8
+ 5
+ 5
50W
to ground
+ 4
+ 7
+ 4
+ 2
+ 6
+ 3
+ 3
+ 5
+ 1
+ 2
+ 2
+ 4
+ 1
+ 3
0
0
Min.
-2
-1
Min.
+ 1
-1
0
0
-2
-3
+ 1
Low level [V]
+ 2
Low level [V]
-1
0
+ 1
+ 2
+ 3
+ 4
+ 5
1
Low level and high level voltage ranges
when the output is loaded at high impedance
to ground.
ID Quantique SA
Chemin
in de la Marbrerie 3
-3
-2
2
-1
0
+ 1
+ 2
+ 3
+ 4
+ 5
Low level [V]
Minimum and maximum voltage swings
when the output is loaded at high impedance
to ground.
1227 Carouge/Geneva
Switzerland
-2
-1
0
+ 1
+ 2
+ 3
-1
0
+ 1
+ 2
Low level [V]
3
Low level and high level voltage ranges
when the output is loaded at 50W
to ground.
T +41 22 301 83 71
F +41 22 301 83 79
4
Minimum and maximum voltage swings
when the output is loaded at 50W
to ground.
info@idquantique.com
www.idquantique.com
com
6
USER INTERFACE - DATA & SETUP RECOVERY
All the user parameters are intuitively adjustable with direct access buttons (Detector, Inputs/Outputs, Display, System,
Setups and Acquisition), submenus control buttons and the control wheel on the id210 front panel.
optical window for automatic
backlight intensity adjustement 5.7" VGA TFT-LED color display submenu control buttons
direct access buttons
control wheel
id210 - Advanced System for Single Photon Detection
Detector
Inputs/Outputs
Display
Help
System
Start/Stop
help
access
start/stop
button
Setups
FC/PC
optical fiber
input
Acquisition
USB
Power
Aux 1
Aux 2
Trigger
Reset/Enable
Clock
Inputs
ON/OFF power button
with status LED
Inputs/Outputs SMA connectors
and indicating LEDs
Gate
Detection 1 Detection 2
Outputs
USB connectors
(keyboard, storage key)
The bicolor indicating LEDs associated to SMA connectors inputs or outputs provide relevant informations such as valid
triggers, pulses traffic at the outputs or unused inputs/outputs in the selected mode. Two USB connectors on the front
panel can be used for connecting a keyboard or for data export on a storage key. The backlight intensity is adjusted
automatically. The id210 is equipped with a buzzer that can be optionally used for indicating, for instance, the end of the
cooling phase. On the rear panel, Ethernet and USB connectors can be used for remote control. A VGA HD-15
connector for external monitor/projector is accessible as well on the rear panel.
The id210 contains 6 HF counters providing the Detection, Clock, Gate, Aux1, Aux2 and Aux1&Aux2 coincidence rates.
The id210 displays indicators associated to counters. Up to 5 different views can be set, saved and restored. A view
defines the number of indicators displayed simultaneously (selected between 1 and 4) and the counter associated to
each indicator.
REMOTE CONTROL (OPTIONAL)
A stand-alone application allowing you to control your
id210, to plot graphics and to export measurements of
counters remotely is delivered. No additional program is
necessary to drive the id210.
The remote control "id210 Front panel" application, built
using Labview, is delivered with its Labview Vi file - thus,
you can modify the remote control application if you own a
Labview license from National Instruments.
Additionally, a command reference guide is provided,
enabling you to write your own remote control application
in any programming language such as C or C++.
ID Quantique SA
Chemin
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
7
REDEFINING PRECISION
id220-FR
COST-EFFECTIVE MODULE FOR ASYNCHRONOUS SINGLE
PHOTON DETECTION AT TELECOM WAVELENGTHS
The id220-FR brings a major breakthrough for single photon detection in free-running mode at telecom
wavelengths. It provides a cost-effective solution for applications in which asynchronous photon detection
is essential. The cooled InGaAs/InP avalanche photodiode and associated electronics have been specially
designed for achieving low dark count and afterpulsing rates in free-running mode. The module can operate
at three detection probability levels of 10%, 15% and 20% with a deadtime that can be set between 1 s and
25 s. Arrival time of photons is reflected by a 100ns LVTTL pulse available at the SMA connector with a
timing resolution as low as 250ps at 20% efficiency. A simple USB interface allows the user to set the
efficiency level and the deadtime. A standard FC/PC connector followed by a single mode fiber is provided as
optical input. The id220-FR comes with a +12V 60W adapter .
!
EW
in
F
M
t
pu
av
o
ls
b
ai l a
le
a
M
N
K EY FEATURES
APPLICATIONS
Asynchronous detection mode (free-running)
Quantum optics, quantum cryptography
10%-15%-20% photon detection probability levels
Fiber optics characterization
1 s-25 s adjustable deadtime
Single-photon source characterization
Timing resolution as low as 250ps
Failure analysis of electronic circuits
Low dark and afterpulsing rates
Eye-safe Laser Ranging (LIDAR)
SMF or MMF optical input
Spectroscopy, Raman spectroscopy
100ns LVTTL output pulse at SMA connector
Photoluminescence
Singlet oxygen measurement
Fluorescence, fluorescence life time
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
1
In contrast with usual gated operation of detectors based on InGaAs/InP avalanche photodiodes (APDs), the
id220-FR operates in free-running (asynchronous) mode. The APD is biased above its breakdown voltage in
the so-called Geiger mode. Upon photon absorption, the photon arrival time is reflected by the rising edge of
a 100ns width LVTTL pulse at the output.The id220-FR has been designed for providing a fast avalanche
quenching, thus limiting the afterpulsing rate. This allows the operation at reasonably short deadtimes of
values that can be optimized depending on the applications and the efficiency level.
Free-running mode (asynchronous)
Photon
arrival
Time [0 to
No detection !
Detector is OFF
s]
Avalanche
Detection
Detection
100ns Detection
Output Pulse
100ns Detection
Output Pulse
Detection Output
Quenching
Quenching
ON
Dead Time [1 to 25 s]
APD State
Dead Time [1 to 25 s]
OFF
SPECIFICATIONS
Parameter
Min
Wavelength range
900
3
Optical fiber type
Efficiency range
Typical
1
Dark count rate (10us deadtime)
Max
Units
1700
nm
1
Calibrated at =1.55 µm.
2
SMF or MMF
10, 15 or 20
%
2
SMF 10% 15% 20% efficiency
1 / 2.5 / 5
kHz
MMF 10% 15% 20% efficiency
1.2 / 3 / 6
kHz
Timing resolution (FWHM)
10% 15% 20% efficiency
Deadtime range
400 / 300 / 250
1
25
Deadtime step
Weight
s
LVTTL / 100ns width
4
Output connector
Dimensions LxWXH
s
1
Detection output pulse
Operating temperature
ps
Typical DCR versus Deadtime at 10%, 15% and
20% efficiencies.
SMA
+10
+30
°C
230x110x120
mm
2.5
Optical connector
kg
FC/PC
60W AC/DC +12V green power adapter
Input voltage
Frequency range
AC current
Cooling time
90~264 VAC - 135~370VDC
47~63 Hz
1.4A/115VAC 1A/230VAC
3
min
3 Single Mode Fibre SMF28, Numerical Aperture = 0.14
or
Multi Mode Fibre with a 62.5um core diameter, Numerical Aperture = 0.275
4 SMA Female connector: Male body (outside threads) with female inner hole.
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
2
SOFTWARE
The id220-FR comes with a software that allows
the user to set the efficiency level and the
deadtime through a simple USB interface.
The module can also operate disconnected from
the PC. The settings are reloaded upon each
power up.
ACCESSORY - OPTIONAL PULSE SHAPER
IDQ provides as an option a pulse shaper (A-PPID) which can be used with devices requiring
negative input pulses. The leading edge of the
id220 output pulse is converted into a sharp
negative pulse with typical amplitudes of 1.4V for
a 50W load and 2.5V for a high impedance load.
The pulse shaper comes with two SMA/BNC
adapters.
Ordering information:
idacc-A-PPI-D
Pulse shaper
Typical output pulse of an id220 Typical output pulse of an id220
equipped with a A-PPI-D pulse equipped with a A-PPI-D pulse shaper
shaper in 50W load.
in high impedance load.
ACCESSORY - OPTIONAL SMA ELECTRICAL CABLE
To connect your id220 to other devices, such as the pulse shaper
(A-PPI-D) or certain acquisition card (SPC-130 from Becker &
Hickl), IDQ recommends this SMA Male / SMA Male Cable. SMA
Male means Female body (inside threads) with male inner pin
(see picture)
Ordering information:
idacc-SMA-SMA-1m
SMA Male to SMA Male electrical Cable
ACCESSORY - METALLIC OPTICAL FIBRE
The standard optical patchcord can be transparent. Unwanted
photons from the ambient environment can pass by the cladding
of the fiber and so perturbate your measurement.
The metallic jacket fiber is delivered with FC/PC connectors
Ordering information:
idacc-SMF-Steel-2m
idacc-MMF-Steel-2m
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
SMF28 fiber and length 2m.
core diameter 62.5um and length 2m.
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
3
REDEFINING PRECISION
id300 SERIES
SUB-NANOSECOND PULSED LASER SOURCE
IDQ’s id300 Short-Pulse Laser Source has been designed to meet the specific requirements
of researchers who need to generate short laser pulses at a wavelength of 1310nm or
1550nm.
The laser source, based on Fabry-Perot (FP) or on distributed-feedback (DFB) laser diodes,
is triggered externally via a trigger input to produce sub-nanosecond laser pulses with a
repetition rate ranging from 0 to 500MHz.
The id300 laser source is ideally suited to work in combination with IDQ’s Single Photon
Detection and Counting Modules (id210 series).
The laser source can be directly triggered by the id210's internal clock. Used in combination
with a variable optical attenuator, this short-pulse laser source makes an ideal cost-effective
single-photon source.
APPLICATIONS
K EY FEATURES
Sub-nanosecond laser pulses
Quantum optics
Repetition rate from 0 to 500MHz
Fiber optics characterization
Wavelength: 1310nm or 1550nm
Optical measurements
(DWDM ´s available upon request)
External trigger
Compact and reliable stand-alone unit
FC/PC connector
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
REDEFINING PRECISION
id300 SERIES
SPECIFICATIONS (T=25ºC)
Parameter
Min
Typical
Max
Units
Wavelength
1290
1310
1330
nm
Wavelength
1520
1550
1580
nm
7
15
nm
0.6
1.5
nm
500
MHz
0.5
ns
Spectral width (FWHM) - FP laser type
Spectral width (FWHM) - DFB laser type
Frequency range
0
Pulse duration
0.3*
Peak power
0.7
1
Output power at 1MHz
-36
-35
Trigger input**
mW
-34
dBm
NIM, ECL, PECL, LVPECL, TTL, TTL 50
* can be increased up to 2ns upon request
** choose one trigger input from this list. See ordering information below.
GENERAL INFORMATION
OPERATING PRINCIPLE
Electrical input: e.g. N M signal (example: frequency = 1MHz)
Optical output:
Peak power
= 0 dBm
0.3ns
1 s
Average power
= -35 dBm
Operating Temperature
+10°C to +30°C
Dimensions LxWxH
185 mm x 172 mm x 55 mm
Weight
915 g
Optical Connector
FC-PC
Electronic Connector
BNC
Fiber Type
SMF
Power Supply
100 - 240 VAC (autoselect)
WARNING
CLASS 1 LASER PRODUCT
CLASSIFIED PER IEC 60825-1, Ed 1.2, 2001-08
ORDERING INFORMATION AND SALES CONTACT
Part number: id300-XXXX-YYY-ZZZ
XXXX: Select wavelength. Choose between 1310 and 1550.
YYY:
Select laser type. Choose between FP (Fabry-Perot) and DFB (distributed
feedback).
ZZZ:
Select trigger input signal specifications. Choose between NIM, ECL, PECL,
LVPECL, TTL, TTL 50 .
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2006-2011 ID Quantique SA - All rights reserved - id300 v4 0 - Specifications as of March 2012
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
REDEFINING PRECISION
id400 SERIES
SINGLE-PHOTON DETECTOR FOR 1064NM
The id400 single photon detection module consists of a detection head and a control unit.
The detection head is built around a cooled InGaAsP/InP avalanche photodiode (APD)
optimized for 1064nm single-photon detection and a fast sensing and quenching electronic
circuit. Single-photon detection efficiency can be adjusted at three preset levels and the
detector can be operated both in free running or gated modes.
The control unit performs APD temperature control and regulation, power supply, gate
generation and dead time setting. It also includes BNC connectors for input-output signals
and a USB interface. The detector is controlled using a LabVIEW virtual instrument, which
offers intuitive menus and a graphical interface.
The id400 includes invaluable functions, such as an adjustable deadtime or electronic delay
lines, which allow the optimization of its performance and make it a simple tool to use.
KEY FEATURES
APPLICATIONS
Adjustable detection probability up to 30%
Free-space optical communications
Gated or free running modes
Satellite laser ranging
Internal or external gated modes
Atmospheric research and meteorology
Adjustable gate width from 500ps to 2μs
Laser range finder
Adjustable deadtime up to 100μs
Free-space quantum cryptography
Adjustable internal clock up to 4MHz
Quantum optics
Adjustable delays up to 1μs by steps of 50ps
Spectroscopy
Internal counters
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
PRINCIPLE OF OPERATION
The id400 is a complete single photon counting system based on a cooled InGaAsP/InP avalanche photodiode
(APD) optimized for 1064nm. The APD temperature is set to -40°C upon assembly to optimize the id400 overall
performance. The id400 offers advanced functionalities, including:
Free-running, internal gating or external gating modes:
In free-running or asynchronous mode, the APD is biased above the breakdown voltage in the so-called
Geiger mode. Upon a photon arrival (or a dark count generation), an avalanche takes place in the APD. The
avalanche is sensed by the id400 and reflected at Detection OUT by the rising edge of a TTL pulse. The id400 pulser
provides a fast avalanche quenching required to limit the afterpulsing rate. The operating voltage is then restored at
the end of the dead time and the id400 is ready to detect a subsequent photon.
In gating or synchronous mode, a voltage pulse is applied to raise the bias above APD breakdown voltage
upon triggering. The gating can be either internal or external. The APD is only active during gates. The gating mode
is used in applications where the arrival time of the photon is known. It allows a reduction of the dark count rate.
Adjustable single photon detection probability level. In any avalanche photodiode, the single photon detection
probability increases with the excess bias voltage (difference between operating and breakdown voltages). The
timing resolution is also improved at high excess bias voltages. On the other hand, the dark count and afterpulsing
rates increase with the excess bias voltage. The id400 provides three levels of single photon detection probability
(7.5 %, 15% and 30%, measured at 1064nm).
Adjustable dead time. At high gating frequencies or when operated in free-running mode, afterpulsing may
significantly deteriorate performances. To suppress detrimental afterpulsing effects, the id400 includes a deadtime
(1μs to100μs by step of 1μs). In deadtime mode, the id400 monitors the effective gate rate.
Gate generator (for internal gating mode) with adjustable gate duration (500ps to 2μs by step of 10ps) and
frequency (1Hz to 4MHz).
Electronic delays (for internal gating mode) between Reference OUT(clock signal) and Gate OUT and between
Reference OUT(clock signal) and the actual detector gate for simple detector synchronization.
Internal counters, whose results are displayed on the Labview Virtual Instrument monitor detection and effective
gate rates. For each detection, the module also produces a TTL pulse available on the id400 control unit front panel
BNC connector.
All the user-adjustable parameters can be easily set using the Labview Virtual Instrument. They can also be stored
by the control unit for operation without PC.
BLOCK DIAGRAM
id400 control unit
+12V
Temperature
Control
Micro
controller
Det.Proba.
7.5/15/30 %
USB
FPGA
Counter
id400 detection head
Power/Control DB9 cable
Gate Command
Pulser
TEC
APD
Gate OUT
Mode
free-running
int. gating
ext. gating
Dead Time
1/100us
step 1us
Gate
Width
500ps/2us
step 10ps
Internal
Gate
Frequency
Delays
Ref-Gate OUT
Ref-Actual Gate
Reference OUT
Detection OUT
Detection
External Trigger IN
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
SPECIFICATIONS
Parameter
Conditions
Min
Typical
Max
Units
Internal External
Gating
Gating
Free
Running
nm
üüü
μm
%
üüü
üüü
Timing resolution at 7.5% SPDE 2
Timing resolution at 15% SPDE 2
ps
üüü
ps
üüü
Timing resolution at 30% SPDE 2
Dark count rate at 7.5% SPDE
ps
üüü
with 20μs deadtime
150
Hz
ü
Dark count rate at 15% SPDE
with 20μs deadtime
400
Hz
ü
Dark count rate at 30% SPDE
with 20μs deadtime
2000
Hz
ü
100
μs
üüü
Wavelength range
900
Effective optical diameter
Single-photon detection probability (SPDE)
80
7.5, 15, 30
1
Adjustable deadtime range
1
μs
üüü
1
6
4x10
Hz
ü
5
2000
ns
ü
ps
ps
ü
ü
ps
ps
ü
ü
ns
ü
ü
Adjustable deadtime step
Internal gating frequency (fint gating) 3
1150
1
4
5
Gate width (tgate out) 4
Gate adjustment step
Δtref out/gate out adjustable delay range
10
0
Δtref out/actual gate adjustable delay range
Adjustable delay step
0
Reference OUT pulse width
8
3
3
50
10
Reference OUT pulse amplitude (50Ω)
2.3
3.3
V
Detection OUT pulse width
100
130
ns
Detection OUT pulse width
90
6
ns
Detection OUT pulse amplitude (50Ω)
2.3
3.3
V
üüü
Gate OUT pulse amplitude (50Ω)
2.3
3.3
V
ü
7
ns
ü
4x106
10
Hz
ns
ps
ü
ü
ü
Trigger IN pulse width
Trigger IN frequency 7
Δext trigger/actual gate adjustable delay range
Adjustable delay step
1
0
50
External Trigger IN amplitude
1.6
External Trigger IN load
3.8
50
Cooling time
at 25°C room temperature
5
Electronic connectors
ü
V
ü
Ω
ü
min
üüü
üüü
BNC
Detection head dimensions LxWxH
üü
ü
97x90x36
mm
üüü
225x170x50
mm
üüü
Detection head weight
290
g
üüü
Control unit weight
1180
g
üüü
Control unit dimensions LxWxH
Operating temperature
0
25
°C
üüü
Storage temperature
0
40
°C
üüü
1
Calibrated at 1064nm.
2
Contact IDQ for more information.
5
Uncertainty on internal frequency
given by (fint gating)2 / 1.2x108.
For a frequency of 1MHz,
uncertainty amounts to 8.333kHz.
6
In internal gating mode, output
pulse width depends on photon
arrival time, but is less than the
gating period 1 / fint gating.
7
Duty cycle (ton / ton + toff) of external
gating signal must be less than
70%.
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
3
Maximum delay values versus
internal gating frequency
1227 Carouge/Geneva
Switzerland
4
Maximum gate width versus internal
gating frequency
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
LabVIEW APPLICATION
DETECTION HEAD DIMENSIONAL OUTLINE
Supported Operating Systems:
Windows XP, Windows Vista 32 bits
(in mm)
97.0
The id400 detector comes with a id400.exe LabVIEW
application operating in two different modes:
DB9
SMB
Standard mode: adjustment of parameters, display
of count rate and effective gate rate.
SMB
63.5
APD
mounting plate
APD
mounting plate
mounting plate
One M4 hole for mounting on
standard post assemblies,
36.0
30.0
APD
The id400 detection head includes a
mounting plate with:
4 holes (∅ 6.5mm) with “metric”
spacing (75mm and 50mm) for
mounting on standard plates or
translation stages,
mounting plate
4 holes with “US” spacing (3 and 2
inches) for mounting on standard
plates or translation stages.
90.0
M4
mounting plate
37.5
38.1
APD
37.5
20 0
30 4
38.1
79.0
30 0
20 4
Acquisition mode: plot of the mean detector count
rate over the specified integration time.
OTHER PRODUCTS
id100
id201
id300
Quantis
Clavis2
Cerberis
Centauris
Single photon counting module for the visible spectral range
Single photon counting module for the 1100-1700nm spectral range
Short pulse laser source
Quantum Random Number Generator
Quantum Key Distribution System for R&D
Layer 2 encryptor with Quantum Key Distribution
Layer 2 encryptor
SUPPLIED ACCESSORIES
ORDERING INFORMATION
id400-80-1064
Detector module including:
1 x APD detection head with mounting plate
(effective active diameter: 80μm)
1 x Control Unit
Composite cable (2m): 2x BNC-SMB, 1x DB9-DB9
USB cable (4.5m)
Power supply (12V/2.5A)
CD-Rom with User Guide, LabVIEW Run-time
Engine Version 7.0, LabVIEW application installer
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2008-2010 ID Quantique SA - All rights reserved - id400 v3.2 - Specifications as of May 2010
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
W
E
N
REDEFINING PRECISION
id800-TDC
8 CHANNEL TIME TO DIGITAL CONVERTER
IDQ’s id800-TDC is an 8-channel time-to-digital converter, coincidence counter, and time interval analyzer.
This system is used to transfer the time-tags of registered events with picosecond precision and at high rates
to a PC. Additionally, it can count single and multiple channel coincident events at even higher rates
internally and report the totals to a PC.
The id800-TDC registers incoming signal events on 8 independent channels, records their exact time (bin
size 81 ps) and channel number and broadcasts these to a PC. A graphical user interface is supplied for
Windows®, software examples are available for C and Labview™.
APPLICATIONS
KEY FEATURES
8 Channels
Time correlated single photon counting (TCSPC)
Easy to use control Software
Fluorescence lifetime imaging
High timing resolution with bin size
as low as 81 ps
High energy physics
High event count rates up to 12.5 million
events per second
Single photon counting
USB 2.0 Interface
Integrated coincidence counter
Precision time measurement
Fluorescence correlation spectroscopy
Quantum cryptography
Data transfer up to 2.5 million events per second
Minimal time between two consecutive counts in
the same channel is 5.5ns
LIDAR
Correlation measurement
Quantum Optics
Optical measurements
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
1
PRINCIPLE OF OPERATION
The id800 contains an ASIC which time-tags events on 8 input channels and multiplexes them together. An
FPGA takes these tags, sorts and compresses them for output. The FPGA also counts coincidences
between channels, allowing accurate real-time reporting of coincidences at high signal rates.
200 MHz 40 MHz
ASIC
2.5 MEvents/s
FPGA
Sorting
Output is limited only by the speed of the
USB 2.0 connection: up to 2.5 million
events per second.
Signal
Compression
Test Signal
Generator
USB Output
APPLICATION #1: Time Interval Analyzer
id300: laser
The id800 is supplied with software for
building histograms of time differences
between time-tags. This is useful for
analysing timing jitter or after-pulsing
probabilities of detectors. For example, a
function generator can be used to
generate pulses from an id300 shortpulse laser source, which are then
attenuated and detected by an id220 function generator
free-running single photon detection
module. The time differences can be
measured by the id800, and investigated
with the id800's provided software. In
this example, the start of the
measurement is triggered with a pulse
from the user. The id800 can also
perform continuous timing
measurements without requiring an
external trigger.
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
id220:SPDM
id800:TDC
Stop
Start
PC
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
2
APPLICATION #2: Coincidence Counter
Laser BBO crystal
id800:TDC
Detectors
PC
The id800 can be used as a real-time
coincidence counter. This mode of
operation is especially useful in
applications such as the optimization
of coupling paired photons from a
spontaneous parametric downconversion (SPDC) source, where it is
necessary to simultaneously optimize
coupling of individual photons as well
as the number of pairs.
Indirect Measurement (Post-Processing)
Direct Measurement
Using a supplied LabView program, real-time plots of
singles and coincidence rates can be generated, useful
for real-time experiment optimization. Histograms and
raw time-tags can also be displayed.
The supplied software can write time-tags
to file, and from this file coincidences can
be counted after detection.
INTERFACES WITH THE id800
There are four provided ways of interfacing with the id800:
Graphical User Interface Software
Command Line Interface
LabView sub-VIs and sample program
C user libraries
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
3
REDEFINING PRECISION
id800-TDC
SPECIFICATIONS
Parameter
Bin size, timing resolution
81 ps
Channels
8
Maximum Count Rate, Total
12.5 Mhz
Data Transfer Rate
2.5 MHz
Minimum Pulse Interval
5.5 ns
Minimum Pulse Width
4 ns
Maximum Count Rate per Channel
10 MHz
Input Connectors
BNC
Input levels
LVTTL (5V tolerant)
PC Interface
USB 2.0
Dimensions
25cm x 10cm x 30cm (width, height, depth)
Power supply
110 - 230 VAC
OTHER PRODUCTS
id100
id101
id110
id150
id210
id220
id300
id400
Quantis
Clavis2
Cerberis
Centauris
Arcis
Single-photon detector for the visible spectral range
Miniature single-photon detector for the visible spectral range (see above)
Single-photon detection system for visible wavelength operating in gated mode
Monolithic linear array of single-photon detectors for the visible range
Single-photon detection system for telecom wavelengths
Free-running single photon detection module - Near infrared range
Short pulse laser source
Single photon counting module for the 900-1150nm spectral range
Quantum Random Number Generator
Quantum Key Distribution System for R&D
Layer 2 encryptor with Quantum Key Distribution
Layer 2 encryptor
Adjustable bandwidth encryptors which offer multi-layer (L3, L4) encryption
IDQ Partner
ORDERING INFORMATION
Part number: id800-TDC
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2006-2012 ID Quantique SA - All rights reserved - id800 v20121105 - Specifications as of November 2012
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
4
Page 2
Table of contents
1. Introduction .............................................................................................................................................................. 3
2. Cryptography............................................................................................................................................................. 3
Box 1: Quantum Random Number Generator (RNG) .............................................................................................. 4
3. Key Distribution......................................................................................................................................................... 5
Box 2: One-way Functions ....................................................................................................................................... 5
4. Quantum Cryptography ............................................................................................................................................ 6
4.1. Principle.................................................................................................................................................................. 6
4.2 Quantum Communications ..................................................................................................................................... 6
4.3. Quantum Key Distribution Protocols ..................................................................................................................... 7
Box 3: The Polarization of Photons.......................................................................................................................... 7
4.4. Key Distillation ....................................................................................................................................................... 8
Box 4: Quantum Key Distribution Protocol ............................................................................................................. 8
Box 5: Rudimentary Privacy Amplification Protocol................................................................................................ 9
4.5. Real World Quantum Key Distribution................................................................................................................. 10
4.6. State-of-the-Art QKD............................................................................................................................................ 11
4.7. Perspectives for Future Developments................................................................................................................ 11
5. Conclusion ............................................................................................................................................................... 12
ID Quantique SA
Ch. de la Marbrerie, 3
1227 Carouge
Switzerland
Tel: +41 (0)22 301 83 71
Fax: +41 (0)22 301 83 79
www.idquantique.com
info@idquantique.com
Information in this document is subject to change without notice.
Copyright © 2012 ID Quantique SA. Printed in Switzerland.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means – electronic, mechanical,
photocopying, recording or otherwise – without the permission of ID Quantique.
Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. ID
Quantique SA disclaims any proprietary interest in the trademarks and trade names other than its own.
Page 3
computer, possessing massively parallel processing
capabilities.
1. Introduction
Classical physics is adequate for the description of
macroscopic objects. It applies to systems larger than
one micron (1 micron = 1 millionth of a meter). It was
developed gradually and was basically complete by the
th
end of the 19 century.
Despite great progress in recent years this goal is still a
challenge. However the first applications of quantum
information
processing
have
already
been
commercialized by ID Quantique (IDQ). The first one,
the generation of random numbers, will only be briefly
mentioned in this paper. It exploits the fundamentally
random nature of quantum physics to produce high
quality random numbers. IDQÂ’s Quantis random
number generator was the first commercial product
based on this principle. It has been used in security,
online gaming and other applications since 2001.
At that time, the fact that classical physics did not
always provide an adequate description of physical
phenomena became clear. A radically new set of
theories - quantum physics - was then developed by
physicists such as Max Planck and Albert Einstein
th
during the first thirty years of the 20 century.
Quantum physics describes the microscopic world
(molecules, atoms, elementary particles), while
classical physics remains accurate for macroscopic
objects. The predictions of quantum physics drastically
differ from those of classical physics. For example,
quantum physics features intrinsic randomness, while
classical physics is deterministic. It also imposes a
limitation on the accuracy of the measurements that
can be performed on a system (Heisenberg's
uncertainty principle).
Although quantum physics had a strong influence on
th
the technological development of the 20 century – it
allowed for example the invention of the transistor or
the laser – its impact on the processing of information
has only been understood more recently. “Quantum
information processing” is a new and dynamic
research field at the crossroads of quantum physics
and computer science. It looks at the consequence of
encoding digital bits – the elementary units of
information – on quantum objects. Does it make a
difference if a bit is written on a piece of paper, stored
in an electronic chip, or encoded on a single electron?
Applying quantum physics to information processing
yields revolutionary properties and possibilities
without any equivalent in conventional information
theory. In order to emphasize this difference, in this
context a digital bit is called a quantum bit or a "qubit"
With the miniaturization of microprocessors, which
will reach the quantum limit in the next ten or so
years, this new field will gain in importance. Its
ultimate goal is the development of a fully quantum
The second application – the main focus of this paper
– is called quantum cryptography. It exploits
Heisenberg's uncertainty principle to allow two
remote parties to exchange a cryptographic key in a
provably secure manner.
2. Cryptography
Cryptography is the art of rendering information
exchanged between two parties unintelligible to any
unauthorized person. Although it is an old science, its
scope of applications remained mainly restricted to
military and diplomatic purposes until the
development
of
electronic
and
optical
telecommunications. In the past twenty-five years,
cryptography evolved out of its status of "classified"
science, and it is now increasingly mandated by
regulations governing data protection for commercial
and public institutions. Although confidentiality is the
traditional application of cryptography, it is also used
nowadays to achieve broader objectives, such as data
authentication,
digital
signatures
and
non1
repudiation .
The way cryptography works is illustrated in Fig. 1.
Before transmitting sensitive information, the sender
1
For a comprehensive discussion of cryptography, refer to “Applied
Cryptography”, Bruce Schneier, Wiley. “The Codebook”, Simon
Singh, Fourth Estate, presents an excellent non-technical
introduction and historical perspective on cryptography.
Page 4
combines the plain text with a secret key, using some
encryption algorithm, to obtain the cipher text. This
scrambled message is then sent to the recipient who
reverses the process, recovering the plain text by
combining the cipher text with the secret key using
the decryption algorithm. An eavesdropper cannot
deduce the plain message from the scrambled one
without knowing the key. To illustrate this principle,
imagine that the sender puts his message in a safe and
locks it with a key. The recipient uses in turn a copy of
the key, which he must have in his possession, to
unlock the safe. The scheme relies on the fact that
both sender and receiver have symmetric keys, and
that these keys are known only to the authorized
persons (also referred to as secret or symmetric key
cryptography)
key is changed, the better the security. In the very
special case where the key is as long as the plain text
and used only once – a “one-time pad” – it can be
proven that decryption is impossible and that the
scheme is absolutely secure.
In commercial applications the encryption algorithm is
normally public – with the effectiveness of the
encryption deriving from the fact that the key is
secret.
This means firstly, that the key generation process
must be appropriate, in the sense that it must not be
possible for a third party to guess or deduce it. Truly
random numbers must thus be used for the key. Box 1
describes a quantum random number generator.
Box 1: Quantum Random Number
Generator (RNG)
Figure 1: Principle of Cryptography
Numerous encryption algorithms exist. Their relative
strengths essentially depend on the length of the key
they use. The more bits the key contains, the better
the security. The DES algorithm – Data Encryption
Standard – played an important role in the security of
electronic communications. It was adopted as a
standard by the US federal administration in 1976. The
length of its keys is however only 56 bits. Nowadays
traditional DES can be cracked in a few hours. It has
been replaced by the Advanced Encryption Standard –
2
AES – which has a minimum key length of 128 bits .
In addition to its length, the amount of information
encrypted with a given key also influences the
strength of the scheme. In general, the more often a
2
For recommendations on minimum key lengths and the longevity of
protection provided by each key scheme refer to
http://www.keylength.com/
Classical physics is deterministic. If the state of a
system is known, physical laws can be used to
predict its evolution. On the contrary, the outcome
of certain phenomena is, according to quantum
physics, fundamentally random. One example is the
reflection or transmission of an elementary light
“particle” – a photon – on a semi-transparent
mirror. In such a case, the photon is transmitted or
reflected by the mirror with a probability of 50%. It
is thus impossible for an observer to predict the
outcome. Because of this intrinsic randomness, it is
natural to use this to generate strings of highquality random numbers. IDQÂ’s Quantis is a
quantum RNG exploiting this principle.
Page 5
Secondly, it must not be possible for a third party to
intercept the secret key during its exchange between the
sender and the recipient. This so-called “key distribution
problem” is absolutely central in cryptography.
3. Key Distribution
For years, it was believed that the only possibility to solve
the key distribution problem was to send some physical
medium – a disk for example – containing the key. In the
digital era, this requirement is clearly unpractical. In
addition it is impossible to check whether this medium
has been intercepted and its content copied.
In the late sixties and early seventies, researchers of the
British "Government Communication Headquarters"
(GCHQ) invented an algorithm to solve this key
distribution problem. To take an image, it is as if they
replaced the safe mentioned above by a padlock. Before
the communication, the intended recipient sends an open
padlock to the party who will be sending valuable
information. The recipient keeps the key to the padlock.
Before transmitting the information the sender closes the
padlock, thus protecting the data he sends. The recipient
is then the only person who can unlock the data with the
key he kept. “Public key cryptography” was born. This
invention however remained classified and was
independently rediscovered in the mid-seventies by
American researchers. Formally, these padlocks are
mathematical expressions of so-called “one-way
functions”, because they are easy to compute but difficult
to reverse (see Box 2). As public key cryptography
algorithms require complex calculations, they are slow.
For this reason they are not used to encrypt large amount
of data but instead to exchange short session keys for
secret-key algorithms such as AES.
In spite of the fact that it is extremely practical, the
exchange of keys using public key cryptography suffers
from two major flaws. First, it is vulnerable to
technological progress. Reversing a one-way function can
be done, provided one has sufficient computing power or
time available. The resources necessary to crack an
algorithm depend on the length of the key, which must
therefore be carefully selected.
Box 2: One-way Functions
The most common example of a one-way function is
factorization. The RSA public key system is actually
based on this mathematical problem. It is relatively
easy to compute the product of two prime integers –
say for example 37 * 53 = 1961, because a practical
method exists. On the other hand, reversing this
calculation – finding the prime factors of 1961 – is
tedious and time-consuming, especially with key
lengths of 2048 or more bits. No efficient algorithm
for factorization has ever been disclosed. It is
important to stress however that there is no formal
proof that such an algorithm does not exist. It may
not have been discovered yet orÂ… it may have been
kept secret.
In principle, an eavesdropper could indeed record
communications and wait until he can afford a computer
powerful enough to crack them. This assessment is
straightforward when the lifetime of the information is
one or two years, as in the case of credit card numbers,
but quite difficult when it spans a decade. In 1977, the
three inventors of RSA – the most common public key
cryptography algorithm – issued a challenge in an article
entitled “A new kind of cipher that would take million of
years to break”. The challenge was to crack a cipher
encrypted with a 428-bits key. They predicted at the time
that this would take 40 quadrillion years. However the
$100 prize was claimed in 1994 after 6 months of work by
a group of scientists using parallel computing over the
Internet, and the resulting solution “The magic words are
squeamish ossifrage” has gone down in the history of
cryptanalysis.
Other public-key cryptography schemes based on the
intractability of certain mathematical problems are now in
use, such as elliptic curve cryptography. For elliptic-curvebased protocols, it is assumed that finding the discrete
logarithm of a random elliptic curve element with respect
to a publicly-known base point is infeasible. The
minimum recommended length for asymmetric keys
continues to grow in response to threats from
Page 6
improvements in technology and increased computing
power.
In addition in 1994 there was an attack on another front Peter Shor, professor of Applied Mathematics at MIT,
proposed an algorithm for integer factorization which
would run on a quantum computer and allow to reverse
one-way functions - in other words to crack some versions
of public key cryptography. The development of the first
quantum computer will immediately make the exchange
of a key with current public key algorithms insecure.
The second major flaw with public key cryptography is
that it is vulnerable to progress in mathematics. In spite of
tremendous efforts, mathematicians have not yet been
able to prove that public key cryptography is secure. It has
not been possible to rule out the existence of algorithms
that allow the reversal of one-way functions. The
discovery of such an algorithm would make public key
cryptography insecure overnight. It is even more difficult
to assess the rate of theoretical progress than that of
technological advances. There are examples in the history
of mathematics where one person was able to solve a
problem, which kept other researchers busy for years or
decades. It is even possible that an algorithm for reversing
some one-way functions has already been discovered, but
kept secret. These threats simply mean that public key
cryptography cannot guarantee future-proof key
distribution.
4. Quantum Cryptography
4.1. Principle
Quantum cryptography solves the problem of key
distribution by allowing the exchange of a cryptographic
key between two remote parties with absolute security,
guaranteed by the fundamental laws of physics. This key
can then be used securely with conventional
cryptographic algorithms. The more correct name for
quantum cryptography is therefore Quantum key
Distribution.
The basic principle of quantum key distribution (QKD) is
quite straightforward. It exploits the fact that, according
to quantum physics, the mere fact of observing a
quantum object perturbs it in an irreparable way. For
example, when you read this white paper, the sheet of
paper must be illuminated. The impact of the light
particles will slightly heat it up and hence change it. This
effect is very small on a piece of paper, which is a
macroscopic object. However, the situation is radically
different with a microscopic object. If one encodes the
value of a digital bit on a single quantum object, its
interception will necessarily translate into a perturbation
because the eavesdropper is forced to observe it. This
perturbation causes errors in the sequence of bits
exchanged by the sender and recipient. By checking for
the presence of such errors, the two parties can verify
whether an eavesdropper was able to gain information
on their key. It is important to stress that since this
verification takes place after the exchange of bits, one
finds out a posteriori whether the communication was
intercepted or not. This is why the technology is used to
exchange a key and not valuable information. Once the
key exchange is validated, and the key is provably secure,
it can be used to encrypt data. Quantum physics allows
to formally prove that interception of the key without
perturbation is impossible.
4.2
Quantum Communications
What does it mean in practice to encode the value of a
digital bit on a quantum object? In telecommunication
networks, light is routinely used to exchange information.
For each bit of information, a pulse is emitted and sent
down an optical fiber – a thin fiber of glass used to carry
light signals – to the receiver, where it is registered and
transformed back into an electronic signal. These pulses
typically contain millions of particles of light, called
photons. In quantum key distribution the same approach
is followed with the difference that the pulses contain
only a single photon. A single photon represents a very
tiny amount of light (when reading this white paper your
eyes register billions of photons every second) and it
follows the laws of quantum physics. In particular, it
cannot be split into halves. This means that an
eavesdropper cannot take half of a photon to measure
the value of the bit it carries, while letting the other half
continue its course. If he wants to obtain the value of the
bit, he must observe the photon and will thus interrupt
the communication and reveal his presence. A better
Page 7
strategy is for the eavesdropper to detect the photon,
register the value of the bit and prepare a new photon
according to the obtained result to send it to the receiver.
In QKD the two legitimate parties cooperate to prevent
the eavesdropper from doing so, by forcing him to
introduce errors. Protocols have been devised to achieve
this goal.
4.3. Quantum Key Distribution
Protocols
Although several QKD protocols exist, only one
protocol will be discussed here to illustrate the
principle of quantum key distribution. The BB84
protocol was the first to be invented in 1984 by
Charles Bennett of IBM Research and Gilles Brassard
of the University of Montreal. It is still widely used and
has become a de facto standard.
An emitter and a receiver can implement it by
exchanging single-photons, whose polarization states
are used to encode bit values over an optical fiber
(refer to Box 3 for an explanation of polarization). This
fiber, and the transmission equipment, is called the
quantum channel. They use four different polarization
states and agree, for example, that a 0-bit value can
be encoded either as a horizontal state or a –45°
diagonal one (see Box 4). For a 1-bit value, they will
use either a vertical state or a +45° diagonal one.
Filters exist to distinguish horizontal states from
vertical ones. When passing through such a filter,
the course of a vertically polarized photon is
deflected to the right, while that of a horizontally
polarized photon is deflected to the left. In order
to distinguish between diagonally polarized
photons, one must rotate the filter by 45°.
If a photon is sent through a filter with the
incorrect orientation – diagonally polarized
photon through the non-rotated filter for
example – it will be randomly deflected in one of
the two directions. In this process, the photon
also undergoes a transformation of its
polarization state, so that it is impossible to know
its orientation before the filter.
Linear polarization states
Filters
Box 3: The Polarization of Photons
The polarization of light is the direction of oscillation
of the electromagnetic field associated with its
wave. It is perpendicular to the direction of its
propagation. Linear polarization states can be
defined by the direction of oscillation of the field.
Horizontal and vertical orientations are examples of
linear polarization states.
Diagonal states (+ and – 45°) are also linear
polarization states. Linear states can point in any
direction. The polarization of a photon can be
prepared in any of these states.
50%
50%
Page 8
Box 4: Quantum Key Distribution Protocol
0
1
1
0
1
0
0
1
Receiver bit value
1
1
0
0
1
0
0
1
Sifted key
-
1
-
0
1
-
0
-
Emitter bit value
Emitter photon source
Receiver filter orientation
Receiver photon detector
• For each bit, the emitter sends a photon whose
polarization is randomly selected among the four
states. He records the orientation in a list.
• The photon is sent along the quantum channel.
• For each incoming photon, the receiver randomly
chooses the orientation – horizontal or diagonal –
of a filter allowing to distinguish between two
polarization states. He records these orientations,
as well as the outcome of the detections – photon
deflected to the right or the left.
After the exchange of a large number of photons, the
receiver reveals the sequence of filter orientations he
has used, without disclosing the actual results of his
measurements. This information is exchanged over a
so-called classical channel, such as the internet or the
phone. The emitter uses this information to compare
the orientation of the photons he has sent with the
corresponding filter orientation. He announces to the
receiver in which cases the orientations where
compatible and in which they were not. The emitter
and the receiver now discard from their lists all the
bits corresponding to a photon for which the
orientations were not compatible. This phase is called
the sifting of the key. By doing so, they obtain a
sequence of bits which, in the absence of an
eavesdropper, is identical and is half the length of the
raw sequence. They can use it as a key.
It is thus sufficient for the emitter and the receiver to
check for the presence of errors in the sequence, by
comparing over the classical channel a sample of the
bits, to verify the integrity of the key. Note that the
bits revealed during this comparison are discarded as
they could have been intercepted by the
eavesdropper.
It is important to realize that the interception of the
communications over the classical channel by the
eavesdropper does not constitute a vulnerability, as
they take place after the transmission of the photons.
4.4. Key Distillation
The description of the BB84 QKD protocol assumed
that the only source of errors in the sequence
exchanged by the emitter and the receiver was the
action of the eavesdropper. All practical QKD will
Page 9
however feature an intrinsic error rate caused by
component
imperfections
or
environmental
perturbations of the quantum channel.
In order to avoid jeopardizing the security of the key,
these errors are all attributed to the eavesdropper. A
post processing phase, also known as key distillation,
is then performed. It takes place after the sifting of the
key and consists of two steps. The first step corrects all
the errors in the key, by using a classical error
correction protocol. This step also allows to precisely
estimate the actual error rate. With this error rate, it is
possible to accurately calculate the amount of
information the eavesdropper may have on the key.
The second step is called privacy amplification and
consists in compressing the key by an appropriate
factor to reduce the information of the eavesdropper.
A rudimentary privacy amplification protocol is
described in Box 5. The compression factor depends
on the error rate. The higher it is, the more
information an eavesdropper might have on the key
and the more it must be compressed to be secure. Fig.
2 schematically shows the impact of the sifting and
distillation steps on the key size. This procedure works
up to a maximum error rate. Above this threshold, the
eavesdropper can have too much information on the
sequence to allow the legitimate parties to produce a
key. Because of this, it is essential for a quantum
cryptography system to have an intrinsic error rate
that is well below this threshold – this can be achieved
through the system design and the choice of
components.
Figure 2: Impact of the sifting and distillation steps on the key size
Key distillation is then complemented by an
authentication step in order to prevent a “man in the
middle attack”. In this case the eavesdropper would
cut the communication channels and pretend to the
emitter that he is the receiver and vice versa.
Such an attack is prevented thanks to the use of a preestablished secret key in the emitter and the receiver,
which is used to authenticate the communications on
the classical channel. This initial secret key serves only
to authenticate the first quantum cryptography
session. After each session, part of the key produced is
used to replace the previous authentication key.
Box 5: Rudimentary Privacy
Amplification Protocol
Let us consider a two-bit key shared by the emitter
and the receiver and let us assume that it is 01. Let us
further assume that the eavesdropper knows the first
bit of the key but not the second one: 0?.
The simplest privacy amplification protocol consists in
calculating the sum, without carry, of the two bits and
to use the resulting bit as the final key. The legitimate
users obtain 0 + 1 = 1. The eavesdropper does not
know the second bit. For him, this operation could be
either 0 + 0 = 0 or 0 + 1 = 1. He has no way to decide
which one is the correct one. Consequently, he does
not have any knowledge on the final key. There is a
cost. This privacy amplification protocol shortens the
key by 50%. In practice, more efficient protocols have
obviously been developed.
Page 10
4.5. Real World Quantum Key
Distribution
The first experimental demonstration of quantum
cryptography took place in 1989 and was performed
by Bennett and Brassard. A key was exchanged over
30 cm of air. Although its practical interest was
certainly limited, this experiment proved that QKD was
possible and motivated other research groups to enter
the field. The first demonstration over optical fiber
took place in 1993 at the University of Geneva.
Figure 3: Key creation rate as a function of distance.
The performance of a QKD system is described by the
rate at which a key is exchanged over a certain
distance – or equivalently for a given loss budget.
When a photon propagates in an optical fiber, it has,
in spite of the high transparency of the glass used, a
certain probability of getting absorbed. If the distance
between the two QKD stations increases, the
probability that a given photon will reach the receiver
decreases. Imperfect single-photon source and
detectors further contribute to the reduction of the
number of photons detected by the receiver. The fact
that only a fraction of the photons reaches the
detectors does not however constitute a vulnerability,
as these do not contribute to the final key. It only
amounts to a reduction of the key exchange rate.
Typical key exchange rates for existing QKD systems
range from hundreds of kilobits per second for short
distances to hundreds of bits per second for greater
distances. Since the bits exchanged by the QKD
systems are used for the creation of relatively short
encryption keys (128 or 256-bits), the bit exchange
rate is sufficient to create a regular refresh rate of
provably secret and absolutely random keys. Data is
then encrypted with these keys at transmission rates
up to 10Gbps.
The span of current QKD systems is limited by the
transparency of optical fibers and typically reaches
100 kilometers (60 miles). In conventional
telecommunications, one deals with this problem by
using optical repeaters. They are located
approximately every 80 kilometers (50 miles) to
amplify and regenerate the optical signal. In QKD it is
not possible to do this as repeaters would have the
same effect as an eavesdropper and corrupt the key
by introducing perturbations.
When the distance between the two stations
increases, two effects reinforce each other to reduce
the effective key exchange rate. First, the probability
that a given photon reaches the receiver decreases.
This effect causes a reduction of the raw exchange
rate. Second, the signal-to-noise ratio decreases – the
signal decreases with the detection probability, while
the noise probability remains constant – which means
that the error rate increases. A higher error rate
implies a more costly key distillation, in terms of the
number of bits consumed, and in turn a lower
effective key creation rate. Fig. 3 summarizes this
phenomenon.
Note that if it were possible to use repeaters, an
eavesdropper could exploit them. The laws of
quantum physics forbid this. However it is possible to
set up a network of trusted QKD repeaters to increase
the distance3.
3
For reference to secure key agreements over trusted repeater QKD
networks see http://arxiv.org/pdf/0904.4072.pdf developed within
framework of SECOQC project www.secoqc.net/
Page 11
encryptors over standard optical fibers in an existing
network. Future-proof confidentiality of the data is
guaranteed by the use of QKD.
4.6. State-of-the-Art QKD
In 2002, IDQ launched the first industrialised QKD
system called Clavis, designed for research and
development applications, and in 2008 the next4
generation Clavis2 was launched. Clavis2 uses a
proprietary auto-compensating optical platform,
which features outstanding stability and interference
contrast, guaranteeing low quantum bit error rate.
Secure key exchange becomes possible up to 100 km.
This optical platform is well documented in scientific
publications and has been extensively tested and
characterized. The Clavis2 system is the most flexible
product of its kind on the market. It consists of two
stations controlled by one or two external computers.
A comprehensive software suite implements
automated hardware operation and complete key
distillation. Two quantum cryptography protocols
(BB84 and SARG) are implemented. The exchanged
keys can be used in an encrypted file transfer
application, which allows secure communications
between two stations.
Real-life implementations now reach up to distances
of 100 kilometers (60 miles) over a dedicated fiber.
QKD is primarily used to secure the critical backbone
8
or data recovery center links for financial institutions ,
large companies and defence & government
organizations. However it has also been deployed in
sporting events such as the 2010 South African World
9
Cup .
IDQÂ’s Cerberis QKD server is also compatible with
wavelength division multiplexing (WDM). Quantum
keys can be multiplexed with data over a single fiber
for distances up to 30 km in Metropolitan Area
Networks (MAN). In addition, in 2011 IDQ and Colt
10
launched the worldÂ’s first QKD-as-a-Service for
enterprises and financial institutions.
4.7. Perspectives for Future
Developments
5
In 2007, IDQ launched Cerberis , a QKD server
designed for commercial applications. This has been
deployed and extensively field tested since its
installation that same year for use in elections by the
6
government of Geneva, Switzerland . In addition, the
robustness and reliability of IDQÂ’s QKD technology in a
real-time
telecommunications
network
was
7
unequivocally proven in the Swissquantum project .
This documents the longest ever uninterrupted
deployment of a QKD network, running from end
March 2009 until the project was dismantled in
January 2011.
Future developments in QKD will certainly focus on
increasing the range of the systems. The first option is
to get rid of the optical fiber. It is possible to exchange
a key using quantum cryptography between a
terrestrial station and a low orbit satellite (absorption
in the atmosphere takes place mainly over the first
few kilometers. It can be low, if an adequate
wavelength is selected andÂ…if the weather is clear.)
Such a satellite moves with respect to the earthÂ’s
surface. When passing over a second station, located
thousands of kilometers away from the first one, it can
retransmit the key. The satellite is implicitly
considered as a secure intermediary station. This
technology is less mature than that based on optical
fibers. Research groups have already performed
The Cerberis QKD system provides fully automated,
provably secure key exchange for Layer 2 link
4
5
6
7
http://www.idquantique.com/scientific-instrumentation/clavis2-qkdplatform.html
http://www.idquantique.com/network-encryption/cerberis-layer2encryption-and-qkd.html
http://www.idquantique.com/images/stories/PDF/cerberisencryptor/user-case-gva-gov.pdf
www.swissquantum.ch
8
9
http://www.idquantique.com/images/stories/PDF/cerberisencryptor/user-case-drc.pdf
http://www.idquantique.com/news/press-release-worldcup.html
10
http://www.idquantique.com/images/stories/PDF/cerberisencryptor/user-case-colt-qaas.pdf
Page 12
preliminary tests of such a system, but an actual key
exchange with a satellite remains to be demonstrated.
There are also several theoretical proposals for
11
building quantum repeaters . They would relay
quantum bits without measuring and thus perturbing
them. They could, in principle, be used to extend the
key exchange range over arbitrarily long distances. In
practice, such quantum repeaters do not exist yet
although they are the subject of intensive research.
It is interesting to note that a quantum repeater is a
rudimentary quantum computer. At the same time as
making current public key cryptography obsolete, the
development of quantum computers will also allow
the implementation of quantum cryptography over
transcontinental distances.
5. Conclusion
For the first time in history, the security of
cryptography is dependent neither on the computing
resources of the adversary nor on mathematical
progress. Quantum cryptography, and specifically
QKD, allows the exchange of encryption keys whose
secrecy is future-proof and guaranteed by the laws of
quantum physics. Its combination with conventional
secret-key cryptographic algorithms raises the
confidentiality of data transmissions to an
unprecedented level. Despite being written in 2003,
the MIT Technology Review and Newsweek magazine
were prescient when they identified quantum
cryptography as one of the “ten technologies that will
change the world”.
11
For more information on quantum repeaters see
http://quantumrepeaters.eu/index.php/qcomm/quantum-repeaters
REDEFINING SECURITY
ARCIS
THE BEST OF MULTI-LAYER ENCRYPTION
LAYER 3 & 4 ADJUSTABLE-BANDWIDTH ENCRYPTION
ID Quantique's multi-layer Arcis encryptors are bandwidth adjustable encryption appliances which provide
tunnel-less data protection, including IP packet encryption for Layer 3 networks, and Layer 4 data payload
encryption for IP and MPLS networks and Voice- and Video-over-IP. Arcis encryptors offer full-duplex
encryption at rates ranging from 3Mbps to 10Gbps using the leading AES 256 algorithm. In addition, the
integrity of the data is guaranteed through use of leading authentication protocols.
The Arcis solution enables organisations to standardise on a single platform capable of encrypting at
different layers and at various throughputs. This allows companies to purchase software licenses for their
existing encryption hardware as their bandwidth needs increase, providing both flexibility and investment
protection. Arcis encryptors operate transparently to the network infrastructure, allowing easy integration
without the requirement to upgrade or change the network architecture. The solution is also compatible with
load balancing, highly available network designs, QoS and network monitoring tools.
IP PACKET ENCRYPTION
Using the IP Security (IPsec) protocol, Arcis encryptors provide full data encryption for Layer 3 IP networks.
The Arcis family uses an Encapsulating Security Payload protocol to encrypt the IP packet, while preserving
the original IP header. This unique functionality maintains network transparency, while providing maximum
data protection. By preserving the original header and encrypting only the payload, the encryptors can
protect data over any IP infrastructure including multi-carrier, load-balanced, and high availability networks.
PAYLOAD ONLY ENCRYPTION
In addition to standard IPsec encryption, (which encrypts the Layer 4 header), Arcis encryptors offer a Layer
4 compatible “payload only” encryption option. This unique capability allows network services, such as
Netflow/Jflow, and Class of Service (CoS) based traffic shaping, to be maintained through the service
provider network while the payload itself is encrypted.
ARCIS
ID Quantique SA
Chemin de la Marbrerie 3
FEATURES & BENEFITS
Multi-layer encryption: Layer 3 IP packet and
Layer 4 payload protection
Transparent to networks and applications
Seamless scalability
Easy installation and management
Centralised policy management and enforcement
Creation and management of secure network groups
through group encryption keys
Separation of roles for security control and
network management
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING SECURITY
ARCIS
TECHNICAL SPECIFICATIONS
Encrypted Throughput
?
ARC-10: 3, 6, 10, 25, or 50Mbps
?
ARC-100: 25, 50, 75, 100, 155, or 250Mbps
?
ARC-1000: 100, 155, 250, 500, 650Mbps and 1Gbps
?
ARC-10G: 500, 650Mbps and 1, 2.5, 5 and 10Gbps
Encryption Support
?
AES: (256 bit keys) CBC mode
?
3DES (TDEA)
Authentication and Integrity
HMAC-SHA-1-96
?
Network Support
Ethernet
?
VLAN tag preservation
?
MPLS tag preservation
?
IPv4
?
IPv6 (Layer 2 Ethernet encryption mode)
?
NTP
?
Policy Selector Options
Source or destination IP address
?
Source or destination port number
?
Protocol ID (L3 and L4 options)
?
VLAN ID (L2 option)
?
Multicast address
?
Transforms
ESP Tunnel Mode (header preservation option)
?
ESP Transport Mode (L4 option)
?
Ethernet ESP Mode
?
Device Management
TrustManager
?
Command Line Interface
?
Out-of-band management
?
Alarm condition detection and reporting
?
Syslog support
?
SNMPv2c and SNMPv3 managed object support
?
Audit Log
?
Management Communication Security Options
X.509 v3 digital certificates
?
TLS (full authentication)
?
SSH
?
IKE/IPsec
?
Environmental
Operating temperature: 0° to 40° C (32° to 104° F)
?
EU WEEE & EU RoHS-5
?
Regulatory
Safety: UL 60950-1
?
Emissions for ARC-10, ARC-1000, ARC-10G: FCC part
?
15 subpart B class A
Emissions for ARC-100: FCC part 15 subpart B class B
?
Indicators
Power
?
Alarm
?
LED Status
?
Link Status, Encrypting and 2x8 segment display (ARC10G)
?
Encrypting (ARC-10G)
?
Physical
ARC-10:
?
1U tamper evident chassis
?
Dimensions: 4.0 x 20.3 x 14.7cm (HxWxD)
?
Rack mountable in standard 19" rack or desktop option
?
External Power Adapter: 100-240V A/C @ 1.5A, 50/60Hz,
output 12V D/C, 5A max (60W max)
?
Thermal: In-rush 102 BTU/hr, Steady-state 102 BTU/hr
?
Nominal input current: 0.25A
?
Weight: 1.4 kg as rackmount; 0.8 kg as desktop
?
MTBF: 388,999 hours
?
Data Interface: 2x10/100/1000 RJ45 Ethernet ports
?
Management: 1x10/100 RJ45 Ethernet & 1x RS232 serial port
?
Aux1 RJ45 port for future use
ARC-100:
1U tamper evident chassis
?
Dimensions: 4.4 x 43.0 x 25.4cm (HxWxD)
?
Rack mountable in standard 19" rack or desktop option
?
Power: 100-240V A/C @ 4A, 50/60Hz, auto-sensing
?
Thermal: In-rush 380 BTU/hr, Steady-state 140 BTU/hr
?
Nominal input current: 1.0A
?
Weight: 2.7 kg
?
MTBF: 59,794 hours
?
Data Interface: 2x 10/100/1000 Mbps RJ45 Ethernet ports
?
?
Management: 1x 10/100 RJ45 Ethernet & 1xRS232 serial port
ARC-1000:
1U tamper evident chassis
?
Dimensions: 4.4 x 43.0 x 25.4cm (HxWxD)
?
Rack mountable in standard 19" rack
?
Power: Dual A/C hot swappable 100V@3.A - 240V@1.5A
?
47-63Hz, auto- sensing
Thermal: In-rush 380 BTU/hr, Steady-state 140 BTU/hr
?
Nominal input current: .65A@110V
?
Weight: 4 kg
?
MTBF: 158,520 hours
?
Data Interface: 2x full-duplex Gigabit Ethernet ports with SFP
?
interfaces (single mode, multimode or copper)
?
Management: 1x 10/100 RJ45 Ethernet & 1xRS232 serial port
?
Management SFP port and Aux1 SFP port for future use
ARC-10G:
2U tamper resistant chassis
?
Dimensions: 8.9 x 43.0 x 38.0cm (HxWxD)
?
Rack mountable in standard 19" rack
?
Power: 100-240V A/C @ 4A, 50/60Hz, auto-sensing
?
Dual hot-swappable internal power supplies- AC or DC (-48V)
?
Customer replaceable fan assemblies
?
Data Interface: 2x full-duplex 10 Gigabit Ethernet ports with
?
SFP+ interfaces (single mode, multimode or copper)
?
Management: 1x 10/100/1000 Ethernet RJ45, 1x Gigabit
Ethernet (SFP) & 1x RJ45 serial port
?
3x full-duplex Gigabit Ethernet ports with SFP interfaces (single
mode, multimode or copper) or 3x full-duplex 10/100/1000
Ethernet ports with RJ45 interfaces (for future use)
?
Two USB ports (reserved for future use)
Disclaimer
The information and specifications set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2007-2011 ID Quantique SA - All rights reserved - Arcis v1.4 - Specifications as of January 2012
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING SECURITY
CENTAURIS
THE BEST OF CONVENTIONAL ENCRYPTION
LAYER 2 LINK ENCRYPTION
The Centauris encryptors secure high-speed networks using the proven Advanced Encryption Standard
(AES). Point-to-point and multi-point, wire-speed encryption with low latency and no packet expansion is
made possible by operating at the Layer 2 of the OSI model. The word “layer” refers to the way in which
network communication systems are designed. For example Layer 1 is the physical layer (wire, cables,
connectors etc), Layer 2 is the data link layer (eg Ethernet frames) & Layer 3 is the network layer (eg IP
packets). The challenge lies in maintaining the performance and simplicity of high speed networks while
assuring the security and privacy of user data, whether it is a voice, data or video transmission. Layer 2
encryption is often referred to as a “bump in the wire” technology as it has nearly no overhead and allows the
use of the entire bandwidth. Latency is constant and below 15 microseconds per link. Furthermore, it
ensures protection of all traffic on the network.
Multiple protocols are supported: Ethernet (up to 10Gbps), Fibre Channel (up to 4Gbps) and SONET/SDH
(up to 10Gbps). The encryptors have received stringent international security accreditations - Common
Criteria EAL4+ and FIPS 140-2 Level 3.
The Centauris solution integrates seamlessly into existing network infrastructures. The simple installation
procedure and set-and-forget operation ensures rapid deployment and minimal maintenance
requirements. Advanced management tools and monitoring applications, such as CypherManager and
CypherMonitor, allow easy provisioning and control of security policies for audit and compliance. Group key
management and separation of duties underpin best security practices while advanced networking and
diagnostic features ensure uncompromising performance.
WHY LAYER 2 ENCRYPTION?
No packet expansion and full bandwidth availability
Negligible latency below 15 microseconds
Encryption of all network protocols
High speed full duplex encryption
Ethernet: 10/100, 1 Gbps, 10 Gbps
Fibre Channel: 1G, 2G, 4G
CENTAURIS
ID Quantique SA
Chemin de la Marbrerie 3
SONET/SDH: OC-3, OC-12, OC-48, OC-192
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING SECURITY
CENTAURIS
LAYER 2 PROTOCOLS
Protocols
Ethernet:
Models
Throughput
Crypotgraphy
Accreditations
Mechanical
CN-ETH-10M
10 Mbps
AES, 256-Bit Key, CFB & CTR mode CC EAL4+ and FIPS 140-2
19”rack; 1U
CN-ETH-100M
100Mbps
AES, 256-Bit Key, CFB & CTR mode CC EAL4+ and FIPS 140-2
19”rack; 1U
CN-ETH-1G
1Gbps
AES, 256-Bit Key, CFB & CTR mode CC EAL4+ and FIPS 140-2
19”rack; 1U
CN-ETH-10G
10Gbps
AES, 256-Bit Key, CTR mode
CC EAL4+ and FIPS 140-2
19”rack; 3U
The Ethernet Encryptors support Point-to-Point, Point-to-Multipoint and Multipoint-to-Multipoint Topologies.
The Ethernet Encryptors have speed interoperability from 10Mbps up to 10Gbps
Bandwidth upgrades by licence: CN-ETH-10M to 100Mbps and 1Gbps
CN-ETH-100M to 1Gbps
Fibre Channel: CN-FC-1G
1Gbps
AES, 256-Bit Key, CTR mode
CC EAL4+ and FIPS 140-2
CN-FC-2G
2Gbps
AES, 256-Bit Key, CTR mode
CC EAL4+ and FIPS 140-2
CN-FC-4G
4Gbps
AES, 256-Bit Key, CTR mode
CC EAL4 and FIPS 140-2
Bandwidth upgrades by licence: CN-FC-1G to 2Gbps and 4Gbps
CN-FC-1G to 4Gbps
19”rack; 1U
19”rack; 1U
19”rack; 1U
SONET/SDH:
19”rack; 1U
19”rack; 1U
19”rack; 1U
19”rack; 3U
OC-3
OC-12
OC-48
OC-192
156 Mbps
625 Mbps
2.5 Gbps
10Gbps
AES, 256-Bit Key, CTR mode
AES, 256-Bit Key, CTR mode
AES, 256-Bit Key, CTR mode
AES, 256-Bit Key, CTR mode
CC EAL4 and FIPS 140-2
CC EAL4 and FIPS 140-2
CC EAL4 and FIPS 140-2
CC EAL4 and FIPS 140-2
GENERAL TECHNICAL SPECIFICATION
Key Management
Seamless and automated key management, RSA-2048, group encryption key per VLAN & MAC address
Local and Network Interfaces
SFP transceivers (up to 4Gbps), XFP transceivers (10Gbps)
Access Control
Role-based identification for separation of duties
Audit Trail
Event log, audit log, date and time of secure connection, comprehensive audit reports & alerts via CypherMonitor
Secure Management
SNMPv1, v2 and v3, Ethernet 10/100 RJ45,in-band management on local and network interfaces
Indicators
Two line 20 characters LCD display, LED indicating status of local interface,
network interface, temperature, battery status, system operation and secure status, power
Physical Security
Tamper proof storage of encryption keys and user passwords
Tamper resistant metal case
Environmental
Operating temperature
5° to 40°C
Operating humidity
0 to 80% RH @ 40° C
Non-operating
Non-operating
-10° to 60° C
95% RH @ 40° C
MANAGEMENT & MONITORING
CypherManager provides easy configuration and scalable management via a simple-to-use
GUI. It manages the Centauris encryptors either locally or remotely, via a secure SNMPv3
connection (inband or out-of-band). In addition it acts as a the Certificate Authority for the
encryptor network by signing and distributing X.509 certificates. It is also compatible with
any SNMPv3 compliant network management tool (eg NetView, OpenView, or Tivoli).
CypherMonitor provides a transparent view on the entire encryptor fleet, offering the
capability for real-time security or network alerts or regular configurable reports for audit
and compliance.
CERBERIS QUANTUM KEY DISTRIBUTION
IDQ offers a radically new approach to network security, by combining the power of the Centauris high-speed encryptors
with the unconditional security of Cerberis quantum key distribution (QKD) technology to secure point-to-point backbone
and storage networks.
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2007-2012 ID Quantique SA - All rights reserved - Centauris v3.0 - Specifications as of January 2012.
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING SECURITY
CERBERIS
THE BEST OF CLASSICAL AND QUANTUM WORLDS
LAYER 2 LINK ENCRYPTION
WITH QUANTUM KEY DISTRIBUTION
IDQ offers a radically new approach to network security, by combining the sheer power of
Centauris high-speed layer 2 encryption appliances with the unconditional security of Cerberis
quantum key distribution (QKD) technology to secure point-to-point backbone and storage
networks.
The exchange of secret encryption keys, upon which the encryption security is based, is performed
in a dedicated appliance - the Cerberis QKD server. A fundamental principle of quantum physics observation causes perturbation - is exploited to exchange secret keys between two remote
parties over an optical fiber with unprecedented security. The Cerberis QKD server autonomously
produces, manages and distributes secret keys to up to twelve encryption appliances.
The Cerberis QKD server works in conjunction with Centauris encryptors for high-speed
encryption based on the proven Advanced Encryption Standard (AES). Point-to-point wire-speed
encryption with minimum latency and no packet expansion is made possible by operating at the
layer 2 of the OSI model. Standard network protocols up to a bandwidth of 10Gbps are supported.
These encryptors have received stringent security accreditation (Common Criteria EAL4+ and
FIPS 140-2).
In order to guarantee the highest level of security, a dual key agreement process is used. Separate
encryption keys are exchanged using Quantum Key Distribution and conventional techniques
before being combined to produce a resulting key, as strong as the strongest of the two keys.
The Cerberis solution is highly secure, scalable, versatile and cost effective.
WHY QUANTUM CRYPTOGRAPHY?
High secrecy of cryptographic keys
Intrinsically guaranteed by quantum physics
Dual key agreement
Reveals eavesdropper’s presence
Observation causes perturbation
Future-proof data confidentiality and integrity
High key-refresh rate
CERBERIS
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING SECURITY
CERBERIS
NETWORK DIAGRAM
Network Plane
Location A
Encryptor na
Layer 2 Link Encryption
Up to 12 encryptors
Encryptor nb
Encrypted Network
...
Encryptor 1a
Key Management
Plane
Location B
QKD Server
Dark fiber or
xWDM channel
Quantum Channel
Dark fiber or
DWDM channel
...
Encryptor 1b
Secure Key
Channel
QKD Server
TECHNICAL SPECIFICATIONS
Network Protocols
Ethernet:
Fibre Channel:
SONET/SDH:
ATM:
10 Mbps, 100Mbps, 1Gbps and 10Gbps
FC-1G, FC-2G and FC-4G
OC-3, OC-12, OC-48 and OC-192
OC-3, OC-12
Network Performance
Throughput:
Latency:
100% bandwidth available
<15microseconds
Encryption Algorithm
AES 256-bit, CFB mode (up to 1Gbps), CTR mode (up to 10Gbps)
Security Accreditation
Common Criteria EAL4+ and FIPS 140-2
Key Management
Seamless and automated key management
Dual key agreement:
conventional and quantum cryptography
Key refresh rate:
1 key/minute up to 12 encryptors
Quantum Key Distribution:
BB84 and SARG, up to 50 km (100km upon request)
Conventional Key Agreement: RSA-2048, master key
Local and Network Interfaces
Cerberis QKD Server:
Centauris Encryptors:
SC optical connector, WDM compatible
SFP transceivers (up to 4Gbps), XFP transceivers (10Gbps)
Random Number Generator
Cerberis QKD Server:
Centauris Encryptors:
Quantis Quantum Random Number Generator
Hardware Random Number Generator
Access Control
Role-based identification for separation of duties
Audit Trail
Event log, audit log, date and time of secure connection
Configuration changes
Interface Status
Alarms
Secure Management
QKD Server:
Encryptors:
SNMPv3, Ethernet 10/100 Rj45, touch panel
SNMPv1, v2 and v3, Ethernet 10/100 Rj45, browser TLS or IPSec trusted path
In-band on local and network interfaces
Indicators
QKD Server:
Encryptors:
Touch panel, 240x180 pixels
Two line 20 characters LCD display, LED indicating status of local interface,
network interface, temperature, battery status, system operation and secure
status, power
Physical Security
Tamper proof storage of encryption keys and users passwords
Tamper resistant metal case
Environmental
Operating temperature
Non-operating temperature
Operating humidity
Non-operating humidity
5° to 40° C
-10° to 60° C
0 to 80% RH @ 40° C
95% RH @ 40° C
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2007-2012 ID Quantique SA - All rights reserved - Cerberis v4.0 - Specifications as of January 2012
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING PRECISION
CLAVIS
2
THE MOST VERSATILE QUANTUM KEY DISTRIBUTION
RESEARCH PLATFORM
Quantum Key Distribution is a technology that exploits a fundamental principle of quantum
physics - observation causes perturbation - to exchange cryptographic keys over optical
fiber networks with absolute security. It is attracting a growing interest in the scientific
community. The id3100/id3110 Clavis2 Quantum Key Distribution System - clavis is the latin
word for key - was developed by id Quantique to serve as a versatile research tool.
The id3100/id3110 Clavis2 system uses a proprietary auto-compensating optical platform,
which features outstanding stability and interference contrast, guaranteeing a low quantum
bit error rate. Secure key exchange becomes possible over distances of tens of kilometers.
This optical platform is well documented in scientific publications and has been extensively
tested and characterized.
The id3100/id3110 Clavis2 system is the most flexible product of its kind on the market. It
consists of two stations controlled by one or two external computers.
A comprehensive software suite implements automated hardware operation and complete
key distillation. A powerful graphical log file analyzer is supplied to plot the evolution of key
parameters and variables, allowing intuitive performance analysis. The software suite also
includes a secure chat application using the keys generated by the id3100/id3110 Clavis2
system to encrypt communications.
KEY FEATURES
APPLICATIONS
Autocompensating interferometric set-up
Quantum Cryptography Research
Outstanding stability and contrast
Pilot Network Deployment
User-friendly
Novel Protocols Implementation
Automated operation
Education and Training
Comprehensive software suite
Demonstration and Technology Evaluation
Graphical log analysis tool, secure chat
Flexible and open research platform
Library for C/C++ programming
Sync Out signals
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
om
www.idquantique.com
com
OPTICAL PLATFORM
The id3100/id3110 Clavis2 quantum key distribution
system is based on an autocompensating
interferometric set-up, which guarantees outstanding
contrast and stability. Trains of light pulses are emitted
by a laser and travel from QKDS-B to QKDS-A, where
a qubit value is encoded, before they are reflected
using a Faraday mirror back to QKDS-B. This two-way
approach allows passive compensation for all
fluctuations, both in the quantum channel and the
interferometer. This technology is patented. The
2
id3100/id3110 Clavis system also provides electronic
synchronization signals to connect and synchronize
external components and systems.
Before being reflected, the trains of pulses are stored
in a delay line in the QKDS-A station in order to
suppress Rayleigh backscattering induced noise. The
id3100 Clavis2 system and id3110 Clavis2 system are
equipped with a delay line of 12 kilometers and 24
kilometers, respectively.
The wavelength of the laser used in the id3100/id3110
Clavis2 system is stabilized to a value on the ITU grid.
This wavelength is optionally over a range of 2nm.
QKDS-B
β
C
L
BS
VOA
CD
VOA
α
QKDS-A
FM
BP
DL
PBS
D1
Clavis2
D2
Clavis2
L
C
Di
BS
PBS
β
BP
VOA
CD
DL
α
FM
–
–
–
–
–
–
–
–
–
–
–
–
laser
circulator
quantum detector
beamsplitter
polarizing beamsplitter
phase modulator
bandpass filter
optical attenuator
classical detector
delay line
phase modulator
Faraday mirror
CONFIGURATIONS
The id3100/id3110 Clavis2 stations consist of an optical
and electronic platform and must be controlled by an
external computer (important note: the computers
must be ordered separately from id Quantique or
another supplier). The computers must run under a
Linux Ubuntu distribution. The system can be operated
in a single- or a double-computer configuration.
In the double-computer configuration, a management
Single-Computer Configuration
Double-Computer Configuration
In the single-computer configuration, one computer is
used to control both the QKDS-A and QKDS-B stations.
Two programs running on the same computer are used
to simulate two different devices. Although it does not
allow key exchange to different locations, it is useful for
testing and calibration purposes.
USB 2.0 Connection
(classical) channel is required for system
synchronization and key distillation. This classical
channel is implemented over a TCP/IP connection
over a local area network, the Internet or a dedicated
optical fiber.
The computers can provide cryptographic key material
to external encryption devices or applications through
a dedicated interface.
In the double-computer configuration , a different
computer is used to control each of the id3100/id3110
Clavis2 stations. This configuration allows remote
operation of the system, and a management channel
(TCP/IP connection) is required.
Cryptographic key material interface
to external devices or applications (optional)
Management channel
USB 2.0 Connection
USB Connection
U
t
t
l
l
t
Dedicated
Optical Fiber
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
t
l
Quantum
channel
Q
t
h
l
QKDS-A
USB Connection
l
Quantum channel
QKDS-B
1227 Carouge/Geneva
Switzerland
QKDS-A
T +41 22 301 83 71
F +41 22 301 83 79
Dedicated
Optical Fiber
info@idquantique.com
www.idquantique.com
com
QKDS-B
KEY DISTILLATION
After the raw key material has been exchanged, it is
post-processed in order to reduce the information to
which an eavesdropper could have access to an
2
arbitrarily low level. In the id3100/id3110 Clavis
system, this post-processing is fully implemented and
automated in order to allow secure key exchange. It
consists of four main steps:
Sifting implemented both for BB84 and SARG04
Key distillation
=
Key reconciliation: Cascade algorithm
=
Privacy amplification: Wegman-Carter Strongly
Universal Hashing
Authentication - Universal-hashing with One-Time
Pad encryption
Key material storage and management
SOFTWARE SUITE
QKD Menu Application
The QKD Menu application can be used to control and
operate the id3100/id3110 Clavis2 system. It provides
access to all hardware parameters and allows the user
to perform tasks ranging from system calibration to
secure key exchange. The QKDMenu application is
used to control both the QKDS-A and QKDS-B stations.
QKD Sequence Application
The QKD Sequence application is a fully automated
quantum key distribution program. It controls the
id3100/id3110 Clavis2 system and sequentially performs
the tasks required for quantum key distribution
(hardware monitoring, system synchronization,
interferometric contrast measurement, raw key
production and key distillation). This application stores
the cryptographic key material produced in a key store,
which can be accessed by other applications and
external devices.
QKD Log Analyzer Tool
The QKD Log Analyzer Tool is a program allowing the
user to parse log files produced by the id3100/id3110
Clavis2 system and to graphically display key
parameters and variables in order to analyze their
temporal evolution. The tool runs on any operating
system (SUN Java Virtual Machine 1.6 or newer
required). It can be used on the computers controlling
the system or, alternatively, it can also be run on a third
computer where a log file has been imported for off-line
performance analysis.
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
QKD Device Access Library
The QKD Device Access Library is a library of functions
that can be used to program the id3100/id3110 Clavis2
system in C/C++. It allows users to write customized
programs accessing the system to perform the tasks
required by quantum key distribution. The library includes
functions ranging from low-level primitives allowing the
user to read or set a particular hardware parameter, to
high-level procedures for complete quantum key
distribution. The library includes more than 50 functions,
some of which are specific to one of the stations of the
id3100/id3110 Clavis2 system (QKDS-A or QKDS-B),
while others apply to both. A comprehensive and detailed
reference guide, as well as examples of source code, are
QKD Secure Chat Tool
The QKD Secure Chat Tool is a messaging application
allowing the exchange of encrypted messages between
computers connected to the stations of the id3100/id3110
Clavis2 system. Encryption can be performed using the
One-Time Pad and AES algorithms or can be disabled.
The latter option is useful for data interception
demonstrations. The encryption keys are exchanged
using QKD and are retrieved from the id3100/id3110
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
TECHNICAL SPECIFICATIONS
GENERAL INFORMATION
Parameter
Min
Typical Max Units
466 x 428 x 177
Dimensions (L x W x H)
Rack mountable, space required
4U
Weight (QKDS-A)
16
Weight (QKDS-B)
16
Operating temperature
Relative humidity
Relative humidity
operating @ 30°C
2
non-operating @ 40°C
kg
30
0
80
%
-10
60
°C
90
%
2
1
kg
10
1
Non-operating temperature
mm
°C
RECOMMENDED COMPUTER SPECIFICATIONS
CD-ROM drive
USB 2.0 ports (one and two for single- and doublecomputer configurations respectively)
RAM: 1GB
Hard Disk: a minimum of 100MB of free space for
software suite installation, additional space is
needed when running the applications
Hardware
Optical platform: autocompensating interferometric set-up
Proprietary digital signal generation and data acquisition electronics
Random number generation: Quantis quantum RNG
QKDS-A: 2 x Quantis OEM components
QKDS-B: 1 x Quantis OEM components
Power supply: redundant, auto-sensing, 100-240 VAC @ 50/60 Hz
External computers (sold separately)
Interfaces and Inputs/Outputs
Optical connector (front panel): quantum channel
Connector type:
F3000/APC (compatible LC/APC)
Optical fiber type: SMF-28
Computer interface (front panel): USB 2.0 port
Output Sync Signal Connectors (front panel)
Connector type: BNC
QKDS-A:
classical detector and phase modulator
QKDS-B:
laser trigger and phase modulator
Power supply (rear panel): redundant
Front Panel Indicators
Power LED indicator (red: on)
Quantum Link LED indicator (green: quantum channel active)
Data LED indicator (green: raw key exchange in progress)
Key Exchange
Maximum transmission range:
Secret key rate (id3100 Clavis2):
Secret key rate (id3110 Clavis2):
> 50 km
> 500 bps over 25 km
> 1000 bps over 25 km
Sifting and Key Distillation
Fully automated sifting and key distillation
Sifting for BB84 and SARG04 both supported
Linux Ubuntu distribution (supplied)
OTHER PRODUCTS
Optical Instrumentation
id100/id101/id150 – Single-photon detectors
(350-900nm)
id201
– Single-photon detector
(900-1700nm)
id300
– Short-pulse laser source
(1310 & 1550 nm)
id400
– Single-photon detector
(950-1100nm)
id3110 Clavis2
Network Encryption
Centauris – High-speed layer 2 encryptors
Cerberis
–
High-speed layer 2 encryptors with
quantum key distribution
OPTIONS
ORDERING INFORMATION
id3100 Clavis2
Random Number Generators
Quantis
– Quantum random number generators
quantum key distribution system,
with delay line of 12 kilometers
quantum key distribution system,
with delay line of 24 kilometers
INTELLECTUAL PROPERTY NOTICE
This product is protected by US Patent No.
6,438,234. Other patents pending.
Warranty extension (after first year)
Services (installation, training, on-site and remote
support
Computers with Linux OS and Clavis2 software suite
installed
Optical fiber spools (various lenghts available)
Optical powermeter
High-speed encryptors (Centauris - more information
on www.idquantique.com)
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2006-2010 ID Quantique SA - All rights reserved - Clavis2 v2.0 - Specifications as of January 2010
IID
D Quantique SA
Chemin
C
in de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
com
REDEFINING SECURITY
CYPHERMANAGER & CYPHERMONITOR
ENSURE NETWORK COMPLIANCE AND SECURITY
NETWORK ENCRYPTOR FLEET MANAGEMENT
AND MONITORING APPLICATIONS
ID Quantique's software platform, incorporating CypherManager and CypherMonitor applications,
provides a complete solution for the management and monitoring of a corporation's network encryptor fleet.
Best-practice policies for network encryption are defined by the security team in accordance with the
corporation's risk management framework. These policies are executed by the network team through
CypherManager, which facilitates easy configuration and management of local and remote encryptors. The
status of policies and encryption events can then be verified and controlled by the security team via
CypherMonitor for audit controls or to check the compliance gap.
CYPHERMANAGER
IDQ's CypherManager provides easy configuration and management via an intuitive and simple-to-use
GUI. It provides the granularity and flexibility required to manage the entire range of IDQ encryptors,
scaling from point-to-point data center to global WAN encryption. In addition it acts as the Certificate
Authority for the encryptor network by signing and distributing X.509 certificates.
CypherManager provides inband and out-of-band management secured by SNMPv3. It supports advanced
networking features, such as encryptor autodiscovery, port auto-negotiation, encryptor group management
and remote configuration & upgrade, as well as advanced diagnostic tools. It supports different encryption
policies (Encrypt, Discard, Bypass) which can be applied to different protocols (ethertypes) separately for
unicast, multicast & broadcast traffic. Encryptors can also be managed via a front panel interface. This is an
RS232 port that provides a Command Line Interface supporting a range of commands.
Security
CYPHERMONITOR
&
CYPHERMANAGER
Network
ID Quantique SA
Chemin de la Marbrerie 3
CYPHERMANAGER
Advanced management of local & remote encryptors
Efficient, flexible & intuitive GUI and real-time display
Advanced security features, including role-based
access control
Diagnostics & troubleshooting
Supports advanced networking features
CYPHERMONITOR
Ensures alignment of network with security processes
Real-time alerts on process and security breaches
Pro-active configurable reporting for audit and
compliance overview
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING SECURITY
CYPHERMANAGER & CYPHERMONITOR
Importantly the Cyphermanager tool also supports Role-Based Access Control to ensure best practice
separation of duties – for example the Network team would typically be assigned Supervisor role, with all the
rights to ensure network availability. However the Crypto officer from the security team would retain the
Administrator role with the sole right to manage the crypto keys or load new certificates to create a trusted
network. All actions, alarms and events are recorded, with only the Administrator role having sufficient
privilege level to delete the log files.
CYPHERMONITOR Powered by NetGuardians
CypherMonitor is designed for Security Managers who require transparency and control over the entire
encryptor fleet to ensure the ongoing implementation of security policies. CypherMonitor offers the
capability for real-time alerts via e-mail or mobile phone, and regular pro-active reporting. Alerts can be
configured based on violations of security policies or breaches, such as unsuccessful attempts to access
the encryptor via the Command Line Interface, or changes to the encryptor policy if the encryptors are set to
Bypass mode. In addition regular reporting based on configurable parameters provides security managers
a comprehensive and fully automated overview of the different encryptor events, alarms and operations in a
single clear document. This allows scheduled and timely interventions where necessary, such as the
renewal of certificates prior to expiry. In addition the reports provide regular and verifiable status updates
on key compliance parameters for audits or for forensic analysis.
CypherMonitor is powered by NetGuardians and can be upgraded to monitor the entire network link,
including
g switches, routers or multiplexers.
p
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2007-2011 ID Quantique SA - All rights reserved - CypherManager & CypherMonitor v1 - Specifications as of July 2011
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING RANDOMNESS
QUANTIS
WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE
TRUE RANDOM NUMBER GENERATOR
BASED ON QUANTUM PHYSICS
Although random numbers are required in many applications, their generation is often overlooked.
Being deterministic, computers are not capable of producing random numbers. A physical source of
randomness is necessary.
Quantum physics being intrinsically random, it is natural to exploit a quantum process for such a
source. Quantum random number generators have the advantage over conventional randomness
sources of being invulnerable to environmental perturbations and of allowing live status verification.
Quantis is a physical random number generator exploiting an elementary quantum optics process.
Photons - light particles - are sent one by one onto a semi-transparent mirror and detected. The
exclusive events (reflection - transmission) are associated to "0" - "1" bit values. The operation of
Quantis is continuously monitored. If a failure is detected the random bit stream is immediately
disabled.
Quantis is available as a PCI and PCI Express card, as well as a USB device and integrates easily
in existing applications. It is compatible with the most commonly used operating systems. A library
which allows easy access and a demonstration application are provided.
METAS
Tested and certified by METAS
Swiss Federal Office of Metrology
USB
PCI Express (PCIe)
APPLICATIONS
PCI
MAIN FEATURES
Cryptography
True quantum randomness
Gambling, lotteries
Certified by Swiss National Laboratory
Secure printing
Passes NIST and Diehard randomness tests
PIN number generation
High bit rate up to 16 Mbits/s
Mobile prepaid system
Low cost
Statistical research
Compact and reliable
Numerical simulations
Continuous status check
Easy integration in applications
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING RANDOMNESS
QUANTIS PCI CARD
167.6mm
167.6mm
106.7mm
106.7mm
Quantis-PCI-1 (4Mbits/s)
Quantis-PCI-4 (16Mbits/s)
GENERAL SPECIFICATIONS
Random bit rate
Thermal noise contribution
Storage temperature
Dimensions
PCI local bus specification
Requirements
4 Mbit/s ± 10% (Quantis-PCI-1)
16 Mbit/s ± 10% (Quantis-PCI-4)
< 1% (Fraction of random bits arising from thermal noise)
-25 to +85°C
167.6 mm x 106.7 mm
2.2
IBM-compatible PC with available PCI slot
QUANTIS PCI EXPRESS (PCIe) CARD
120.0mm
64.4mm
Quantis-PCIe-4M (4Mbits/s)
Quantis-PCIe-4M (4Mbits/s)
GENERAL SPECIFICATIONS
Random bit rate
Thermal noise contribution
Storage temperature
Dimensions
PCI Express specification
Requirements
4 Mbit/s ± 10% (Quantis-PCIe-4M)
< 1% (Fraction of random bits arising from thermal noise)
-25 to +85°C
120 mm x 64.4 mm
(supplied with low profile and standard height brackets)
PCI Express Base 1.0a compliant
IBM-compatible PC with available PCI Express slot
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING RANDOMNESS
QUANTIS USB DEVICE
114.0mm
61.0mm
Quantis
TM
Quantum Random
Number Generator
61.0mm
31.0mm
Model n°:
Serial n°:
Quantis USB
090615A410
www.idquantique.com
Made in Switzerland
GENERAL SPECIFICATIONS
4 Mbit/s ± 10% (Quantis-USB-4M)
< 1% (Fraction of random bits arising from thermal noise)
-25 to +85°C
61mm x 31mm x 114mm
2.0
IBM-compatible PC with available USB connector
via USB port
Random bit rate
Thermal noise contribution
Storage temperature
Dimensions
USB specification
Requirements
Power
SUPPORTED OPERATING SYSTEMS
Quantis software (drivers, Quantis library and application)
available for the following operating systems:
PCI1 / PCIe2
Windows XP (32-bit)
Windows XP (64-bit)
Windows Server 2003 (32-bit)
Windows Vista (32-, 64-bit)
Windows Server 2008 (32-, 64-bit)
Windows 7 (32-, 64-bit)
Linux 2.6 (32-, 64-bit)
Solaris / OpenSolaris
FreeBSD
NetBSD
OpenBSD
Max OS X
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
USB3
RANDOMNESS CERTIFICATION
METAS
Tested and certified by METAS
Swiss Federal Office of Metrology
ü
ü
û
û
ü
ü
ü
ü
ü
üNotes:
1 : Quantis-PCI-1, Quantis-PCI-4
ü
ü23 :: Quantis-PCIe-4M
Quantis-USB-4M
support for PCI/PCIe from FreeBSD 7.0
ü
ü45 :: FreeBSD
FreeBSD support for USB from FreeBSD 8.1
6 : Available subsequently. Contact IDQ for more
û
û information
ü
ü
û
û
û
û
û
ü
6
6
4
5
6
6
6
6
6
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com
REDEFINING RANDOMNESS
SOFTWARE
EasyQuantis Application
Quantis comes with a truly invaluable cross
operating system application called EasyQuantis
allowing to read random numbers, which can be
stored in a file or displayed.
Random number can be generated in the
following formats:
Binary
Integers
Floating point
The application including a scaling functionality
and can be used to access multiple Quantis
generators.
Quantis Library
The Quantis library can be used to access the Quantis Quantum Random Number
Generator. The library API is identical for the PCI, PCIe and USB library and is
available on all supported operating systems.
The library offers the possiblity to produce random binary data, integers and floating point numbers. It
can be used to access multiple Quantis generators and includes advanced functionalities such as
random data scaling.
Library Wrappers
Wrappers, allowing to access the Quantis library, as well as sample
source code are provided for the following programming languages:
C++
C#
Java
VB.NET
ORDERING INFORMATION
Quantis-PCIe-4M
PCI Express card with 1 module generating a random bit stream of 4 Mbits/s
Quantis-USB-4M
USB device with 1 module generating a random bit stream of 4 Mbits/s
Quantis-PCI-1
PCI card with 1 module generating a random bit stream of 4 Mbits/s
Quantis-PCI-4
PCI card with 4 modules generating a random bit stream of 16 Mbits/s
RELATED PRODUCTS
Quantis-OEM-4M
OEM component generating a random stream of 4 Mbits/s
Disclaimer
The information and specification set forth in this document are subject to change at any time by ID Quantique without prior notice.
Copyright© 2006-2011 ID Quantique SA - All rights reserved - Quantis v4.1 - Specifications as of May 2011
ID Quantique SA
Chemin de la Marbrerie 3
1227 Carouge/Geneva
Switzerland
T +41 22 301 83 71
F +41 22 301 83 79
info@idquantique.com
www.idquantique.com