Information protection by quantum encryption
Automatic shutdown does not allow data flow to continue circulating and alarming to network administrators whenever any intrusion is detected, even if it is simply "eavesdropping", network machine researched and developed by Harvard University, Boston University and BBN Technologies really promises the future of a super-secure network.

This project has the closest approach to the concept of real quantum coding system , using photon photons to lock and unlock the flow of information, instead of using the key with a random number sequence as shown. now on. Using light quantum technology, scientists can exchange data, email and visit other websites leisurely because their data is strictly protected.
Although the team is still exploring and studying the practical applications of super-security networks, one day, it will be able to replace the coding system currently used in most Internet security, shelter information activities of important government and financial agencies."It's really the technology of the future."- Harvard University scientist John M.Myers said - "Just like lasers and transistors, this technology will be widely applied even though people didn't even think it was feasible or used for it". .
Quantum coding principle

The root foundation of quantum coding comes from the "disposable code" system that spies often use during World War II.These are identical random number pages, each containing a different decryption and encryption key.Confidential information will only be clarified when the recipient has the same digital page as the sender.Similarly, on a quantum network, a laser will separate individual photons, sending them to a device named modulator.The modulator will "pump" them to other network nodes located on fiber optic cables.These photons are encoded when the modulator sends them at different distances and distances: a long distance represents one bit of information, a short distance refers to another bit of information.
At the receiving end, another device will receive photons and determine how they are modulated.If the information sequence corresponds to the original string sent, the key to the code will be saved and used to decrypt the data through conventional means such as the Internet.Any invasion or interference, even just "stealing" photons by sneaking a camera to read the code, will break the motion of the photon line, making the code impossible to use. use, and "ring the bell" to alert network administrators.
What future for super-secure networks?

This is not the first project to develop quantum coding. Previously, MagiQ Technologies once sold a similar system. Recently, a coalition group in Europe also conducted the first bank transfer transaction using quantum cryptography.
However, Boston and Boston's Boston Project, together with BBN, although only limited to these three locations, are still rated as the first Internet integration system that can run seamlessly among many other locations. each other and apart.
Every week, researchers meet at BBN.In the meeting room, a set of transmitters and receivers called "Alice and Bob" - took over two large tables, connected to each other through cables that fell down from the ceiling.They discussed the types of network worms, the problem of energy shortages and the process of developing new devices that complement the system.They even recruited a group of internal hackers who specialized in finding ways to invade the system.
Dr. Myer said this project involves a lot of central knowledge and doctrine of physics, but it is still too early to know exactly what its development direction is.It is possible that the super-security network will be put to commercial use, but right now, the cost and complexity of it will cause the user to limit the localization to customers "heavy bag. "Like big governments and corporations.
However, warnings by Carl J. Williams, a physicist at the National Institute of Standards and Technology, are also conducting independent research on high-speed quantum coding if scientists Only developing a personal quantum supercomputer, hackers will easily take advantage of it to break existing coding standards.
In theory, quantum computers can also become as popular as today's desktop computers.Moreover, there are no technical barriers to the widespread use of quantum encryption technology.For the scientific world, the problem is only "when" but not "if possible" anymore.
Quantum coding is based on a physical principle: subatomic particles can exist simultaneously in many different states before interacting with another. Therefore, even photons used in quantum coding can cause them to change and destroy the key code.
You should read it
- Quantum computing - a marathon, not a sprint contest!
- What is quantum computing and how did people develop this technology?
- New chip technology can enhance quantum computing
- For the first time successfully implementing underwater quantum teleportation, China took the lead in the quantum communication race
- China successfully developed 'handheld' quantum satellite communications equipment
- Quantum computing - the future of humanity
- Join Microsoft's free Quantum computing course today
- Tips for using Firefox Quantum
May be interested
- Quantum computing - the future of humanity'i really think that today, our world is moving slowly into the technology of quantum computing. and all preparations are not excessive. '
- Quantum technology will make data encryption more securetoshiba scientist andrew hammond, working at the university of cambridge lab, believes that the current quantum key distribution systems (like magiq) will soon be replaced.
- Ways to set USB passwords for data protectionusb is small, compact, portable storage devices and users can read on any device that supports usb port. because of these features, usb becomes one of the perfect data transfer and storage devices among computers.
- For the first time, scientists have successfully implemented quantum shifts between two chipsscientists are able to successfully quantum transition for the first time between two computer chips. this means that scientists were able to pass information between two chips through the air in the laboratory by taking advantage of quantum entanglement without the need for wires.
- Windows Information Protection (WIP) price, marketcap, chart, and fundamentals infomicrosoft windows information protection policy is effective in securing corporate data, windows information protection does not overwhelm the user experience on the computer.
- The Encipher download offer, the file and text protection app on Win 10 costs $ 4.39, which is freeif you want to protect, encrypt files and documents with password and recover via email, encipher with encryption algorithm aes 256-bit standard is the right choice for you. this application is only compatible with windows 10 and is priced at 4.39usd but is currently free until march 21, 2018.
- Application protection against DFA attacksdifferential fault analysis, also known as dfa, is an attack technique designed to recover cryptographic keys from the application ...
- Quantum computing - a marathon, not a sprint contest!if you are interested in the technology world, often 'wandering' on many major international technology forums, you've probably met the phrase next big thing - referring to quantum computing technology (quantum computing ).
- What is quantum computing and how did people develop this technology?quantum computers promise to create a revolution in the digital world. however, how will humans harness energy from quantum mechanics?
- How to use Bitlocker to encrypt data on Windows 10 (Part 1)encryption is a method of securing information that does not allow others to use it illegally. when encrypting your information, you can still use this information even if you can share it with other users. in the article below, network administrator will guide you how to encrypt data on windows 10 using bitlocker.