wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security in Quantum and Space Communication

profile
52_Samruddhi Sogam
Oct 20, 2021
0 Likes
0 Discussions
90 Reads

Quantum conversation structures are greater steady as compared to normal networks, due to the fact they depend on the quantum properties of photons, rather than computer code that can be cracked. But constructing Quantum communication structures is expensive. Laws of Quantum communication allow photons of light for transmitting data along optical cables, to take on a state of superposition, which means they can represent multiple combinations of 1 and 0 simultaneously and these particles are called as quantum bits or qubits

QKD involves sending encrypted dataas classical bits over networks, even as the keys to decrypt the records are encoded and transmitted in a quantum state using qubits.An encryption key in the form of qubits whose polarization states represent the individual bit values of the key.

Materials in cables can soak up photons, because of this that they are able to usually tour for no various tens of kilometers. In a classical network, repeaters at diverse factors alongside a cable are used to enlarge the sign to atone for this. QKD networks have give you a comparable solution, creating “depended on nodes” at diverse factors. In Quantum teleportation, it “teleports” the data in Alice’s memory qubit from her photon to Bob’s photon.The hurdles include finding reliable ways of churning out lots of linked photons on demand, and maintaining their entanglement over very long distances.

QUESS, the first-ever quantum-communication satellite launched by China,atop a Long March-2D rocket from the Jiuquan Satellite Launch Center on Aug. 15, 2016. On Mar 22, 2021, ISRO has successfully demonstrated free-space Quantum Communication over a distance of 300 metre with several technologies developed within the country.

Quantum Communication isn’t going to replace the internet very soon. Researchers have warned that even a fully quantum internet may ultimately become vulnerable to new attacks that are themselves quantum based.


Comments ()


Sign in

Read Next

INTRANET

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Jira service Management

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

GIS REMOTE SENSING

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

ProofHub

Blog banner

Google App Engine

Blog banner

Texting is actually better than talking in person

Blog banner

Starvation

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

HR Automation : Need of the hour

Blog banner

Virtual Memory

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

AOL Mail

Blog banner

Instagram

Blog banner

Note on Process, Process creation and Process termination

Blog banner

PERT Overview

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Virtual memory in windows

Blog banner

Deadlock

Blog banner

A little bit of salt is all the hash needs!

Blog banner

MAILFENCE

Blog banner

Guidelines for a low sodium diet.

Blog banner

Service Operations Principles

Blog banner

1.1 basic elements

Blog banner

Getting started with Android Studio

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

What is Spyware? and examples of them.

Blog banner

Components of GIS

Blog banner

Python as a tool for data analysis

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Metasploit

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

The evolution of OS

Blog banner