Information protection by quantum encryption
Automatic shutdown does not allow data flow to continue circulating and alarming to network administrators whenever any intrusion is detected, even if it is simply "eavesdropping", network machine researched and developed by Harvard University, Boston University and BBN Technologies really promises the future of a super-secure network.
This project has the closest approach to the concept of real quantum coding system , using photon photons to lock and unlock the flow of information, instead of using the key with a random number sequence as shown. now on. Using light quantum technology, scientists can exchange data, email and visit other websites leisurely because their data is strictly protected.
Although the team is still exploring and studying the practical applications of super-security networks, one day, it will be able to replace the coding system currently used in most Internet security, shelter information activities of important government and financial agencies."It's really the technology of the future."- Harvard University scientist John M.Myers said - "Just like lasers and transistors, this technology will be widely applied even though people didn't even think it was feasible or used for it". .
Quantum coding principle
The root foundation of quantum coding comes from the "disposable code" system that spies often use during World War II.These are identical random number pages, each containing a different decryption and encryption key.Confidential information will only be clarified when the recipient has the same digital page as the sender.Similarly, on a quantum network, a laser will separate individual photons, sending them to a device named modulator.The modulator will "pump" them to other network nodes located on fiber optic cables.These photons are encoded when the modulator sends them at different distances and distances: a long distance represents one bit of information, a short distance refers to another bit of information.
At the receiving end, another device will receive photons and determine how they are modulated.If the information sequence corresponds to the original string sent, the key to the code will be saved and used to decrypt the data through conventional means such as the Internet.Any invasion or interference, even just "stealing" photons by sneaking a camera to read the code, will break the motion of the photon line, making the code impossible to use. use, and "ring the bell" to alert network administrators.
What future for super-secure networks?
This is not the first project to develop quantum coding. Previously, MagiQ Technologies once sold a similar system. Recently, a coalition group in Europe also conducted the first bank transfer transaction using quantum cryptography.
However, Boston and Boston's Boston Project, together with BBN, although only limited to these three locations, are still rated as the first Internet integration system that can run seamlessly among many other locations. each other and apart.
Every week, researchers meet at BBN.In the meeting room, a set of transmitters and receivers called "Alice and Bob" - took over two large tables, connected to each other through cables that fell down from the ceiling.They discussed the types of network worms, the problem of energy shortages and the process of developing new devices that complement the system.They even recruited a group of internal hackers who specialized in finding ways to invade the system.
Dr. Myer said this project involves a lot of central knowledge and doctrine of physics, but it is still too early to know exactly what its development direction is.It is possible that the super-security network will be put to commercial use, but right now, the cost and complexity of it will cause the user to limit the localization to customers "heavy bag. "Like big governments and corporations.
However, warnings by Carl J. Williams, a physicist at the National Institute of Standards and Technology, are also conducting independent research on high-speed quantum coding if scientists Only developing a personal quantum supercomputer, hackers will easily take advantage of it to break existing coding standards.
In theory, quantum computers can also become as popular as today's desktop computers.Moreover, there are no technical barriers to the widespread use of quantum encryption technology.For the scientific world, the problem is only "when" but not "if possible" anymore.
Quantum coding is based on a physical principle: subatomic particles can exist simultaneously in many different states before interacting with another. Therefore, even photons used in quantum coding can cause them to change and destroy the key code.
You should read it
- Insert the photon into the empty space inside the diamond
- 'Immediately teleport' photons into space
- Quantum computing - a marathon, not a sprint contest!
- What is quantum computing and how did people develop this technology?
- New chip technology can enhance quantum computing
- For the first time successfully implementing underwater quantum teleportation, China took the lead in the quantum communication race
- China successfully developed 'handheld' quantum satellite communications equipment
- Quantum computing - the future of humanity
- Join Microsoft's free Quantum computing course today
- Tips for using Firefox Quantum
- Sycamore, Google's quantum supercomputer only takes 2 seconds to mine the remaining 3 million Bitcoin?
- Successful fabrication of quantum compass to atomic level, replacing GPS in the future
Maybe you are interested
Google Willow Unveiled: Unbelievably Powerful Quantum Superchip
Quantum computers also have to 'admit defeat' to the game Doom
Microsoft is about to build the world's most powerful quantum computer
China's quantum computer is 180 million times faster than a supercomputer
China's largest quantum computing chip allows access to researchers around the world
NVIDIA will support Japan in developing the ABCI-Q quantum supercomputer