wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security in Quantum and Space Communication

profile
52_Samruddhi Sogam
Oct 20, 2021
0 Likes
0 Discussions
89 Reads

Quantum conversation structures are greater steady as compared to normal networks, due to the fact they depend on the quantum properties of photons, rather than computer code that can be cracked. But constructing Quantum communication structures is expensive. Laws of Quantum communication allow photons of light for transmitting data along optical cables, to take on a state of superposition, which means they can represent multiple combinations of 1 and 0 simultaneously and these particles are called as quantum bits or qubits

QKD involves sending encrypted dataas classical bits over networks, even as the keys to decrypt the records are encoded and transmitted in a quantum state using qubits.An encryption key in the form of qubits whose polarization states represent the individual bit values of the key.

Materials in cables can soak up photons, because of this that they are able to usually tour for no various tens of kilometers. In a classical network, repeaters at diverse factors alongside a cable are used to enlarge the sign to atone for this. QKD networks have give you a comparable solution, creating “depended on nodes” at diverse factors. In Quantum teleportation, it “teleports” the data in Alice’s memory qubit from her photon to Bob’s photon.The hurdles include finding reliable ways of churning out lots of linked photons on demand, and maintaining their entanglement over very long distances.

QUESS, the first-ever quantum-communication satellite launched by China,atop a Long March-2D rocket from the Jiuquan Satellite Launch Center on Aug. 15, 2016. On Mar 22, 2021, ISRO has successfully demonstrated free-space Quantum Communication over a distance of 300 metre with several technologies developed within the country.

Quantum Communication isn’t going to replace the internet very soon. Researchers have warned that even a fully quantum internet may ultimately become vulnerable to new attacks that are themselves quantum based.


Comments ()


Sign in

Read Next

De-Coding Love

Blog banner

Supervised and Unsupervised Learning

Blog banner

Interrupts

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Routers

Blog banner

VIRUS

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

PPT methodology

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Cache memory

Blog banner

Artificial Intelligence and I

Blog banner

IT Service Continuity Management

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Importance of education

Blog banner

What is E-commerce

Blog banner

GUIDE TO GIS

Blog banner

Developments in Modern Operating Systems

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Multiprocessor scheduling

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Network Forensics

Blog banner

Footprinting

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Memory Management

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Emerging threats in cyber Forensics

Blog banner

Direct memory access (DMA)

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Computer Security

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

AI and cyber Security

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Crypto tax evasion

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner