Information Protection Quantified Quantum Information

Information Protection Quantified Quantum Information

Automatically interrupts the flow of traffic and alarms network administrators whenever they detect any intrusion, even if it is simply a & quot; eavesdropping & quot; a computer that was developed by Harvard University, Boston University and BBN Technologies. It really promises the future of super-secure networks.

This project has the closest approach to the concept Real-life quantum coding system , using photon photons to lock and unlock information, instead of using a key using a random sequence of numbers. Using quantum photomultiplier technology, scientists can exchange data, send emails and visit other websites in a humble way because their data is strictly protected.

Although the team is still exploring and researching practical applications of super-secure networks, it will be possible to replace the coding system currently used in most of the day. Secure Internet networks protect the information activities of key government and financial institutions. & quot; That's really the technology of the future. & quot; As with lasers and transistors, this technology will be widely used even if people do not even think it is feasible or use it to do so. " ;

Principle of quantum coding

Based on a physical principle, even photon particles used in quantum coding can also cause subatomic particles to change and destroy code keys.

The root platform of quantum cryptography is derived from the & quot; disposable cryptographic system & quot; used by spies during World War II. These are random numbered pages that are exactly the same, each containing a different decryption key and encoding. Confidential information will only be cleared when the recipient has the same page number with the sender. Similarly, on a quantum network, a laser separates individual photons, sending them to a device called a modulator. The modulator will & quot; pump & quot; Push them to the other nodes located on the fiber optic cable. These photons are encoded when the modulator sends them at different distances and distances: a long distance represents a bit of information, a short distance refers to another bit of information.

At the receiving end, another device receives the photon particles and determines how they are processed. If the information chain corresponds to the origin string, the key code is stored and used to decrypt the data through conventional means such as the Internet. Any intrusion or intervention, even if & quot; Photon particles, by stamping a photo detector to read the code, also break down the movement of the photon stream, making the code unusable, and "ringing the bell". Encourages network administrators.

What future for super-secure networks?

What future for real quantum coding?

This is not the first project to develop quantum coding. Earlier, MagiQ Technologies had sold a similar system. Recently, a European union group also conducted the first bank transfer using quantum-coding.

However, the Boston Project of Harvard and Boston, and BBN, though limited to these three sites, is still considered the first integrated Internet system to be able to run seamlessly between multiple locations. each other and away from each other.

Every week, researchers meet again at BBN. In the meeting room, a set of transmitters and receivers called & quot; Alice and Bob & quot; - occupied two large tables, connected with each other through the cable dropped down from the ceiling. They discussed network worms, lack of power, and the development of new devices that complement the system. They even hired an internal hacker group to try to penetrate the system.

Dr. Myer says that this project involves a great deal of knowledge and the central doctrine of physics, but it is still too early to know exactly how it will develop. It is possible that the super-secure network will be commercially available, but at the same time, its cost and complexity will limit the user's reach to the "heavy" customers. bags & quot; like big government and corporations.

However, as noted by Carl J. Williams, a physicist at the National Institute of Standards and Technology, who is also conducting independent research on high-speed quantum coding, if scientists Developing only a personal quantum supercomputer, hackers will easily exploit it to break existing encryption standards.

In theory, quantum computers can also become as popular as today's desktops. Furthermore, there are no technical barriers to the widespread use of quantum-coding technology. For the sake of science, the problem is just & quot; when & quot; is no longer & quot; if possible & quot; half.

& nbsp; Quantum coding is based on a physical principle: subatomic particles can exist simultaneously in many different states before interacting with another. Therefore, even photon particles used in quantum coding can cause them to change and destroy code. & nbsp;