wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security in Quantum and Space Communication

profile
52_Samruddhi Sogam
Oct 20, 2021
0 Likes
0 Discussions
89 Reads

Quantum conversation structures are greater steady as compared to normal networks, due to the fact they depend on the quantum properties of photons, rather than computer code that can be cracked. But constructing Quantum communication structures is expensive. Laws of Quantum communication allow photons of light for transmitting data along optical cables, to take on a state of superposition, which means they can represent multiple combinations of 1 and 0 simultaneously and these particles are called as quantum bits or qubits

QKD involves sending encrypted dataas classical bits over networks, even as the keys to decrypt the records are encoded and transmitted in a quantum state using qubits.An encryption key in the form of qubits whose polarization states represent the individual bit values of the key.

Materials in cables can soak up photons, because of this that they are able to usually tour for no various tens of kilometers. In a classical network, repeaters at diverse factors alongside a cable are used to enlarge the sign to atone for this. QKD networks have give you a comparable solution, creating “depended on nodes” at diverse factors. In Quantum teleportation, it “teleports” the data in Alice’s memory qubit from her photon to Bob’s photon.The hurdles include finding reliable ways of churning out lots of linked photons on demand, and maintaining their entanglement over very long distances.

QUESS, the first-ever quantum-communication satellite launched by China,atop a Long March-2D rocket from the Jiuquan Satellite Launch Center on Aug. 15, 2016. On Mar 22, 2021, ISRO has successfully demonstrated free-space Quantum Communication over a distance of 300 metre with several technologies developed within the country.

Quantum Communication isn’t going to replace the internet very soon. Researchers have warned that even a fully quantum internet may ultimately become vulnerable to new attacks that are themselves quantum based.


Comments ()


Sign in

Read Next

Indian Food

Blog banner

Operating System

Blog banner

SAVE TREES

Blog banner

RACI model in IT services

Blog banner

Void

Blog banner

Heart Fulness Meditation

Blog banner

Virtual Machine

Blog banner

Emailing the merger document

Blog banner

Financial Fraud Detection

Blog banner

APACHE KAFKA

Blog banner

IT service level agreement

Blog banner

Deadlocks

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Google

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

File sharing

Blog banner

(Input/Output) in os

Blog banner

About myself

Blog banner

Fitness

Blog banner

CREATE A DAILY SERIES

Blog banner

Web Site

Blog banner

Which is a good bike to buy?

Blog banner

File management In Operating System

Blog banner

Ransomware

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Disk Management

Blog banner

History of ITIL

Blog banner

What is Vishing?

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

S-Tool : Steganography

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Processes : Process description and control

Blog banner

geographic information system (GIS)

Blog banner

DATA VAULT

Blog banner

1.1 basic elements

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Culture Of Ladakh

Blog banner

Rain bow

Blog banner