The data security of quantum computer systems requires that the entire system uses quantum technology.
The data security of quantum computer systems requires that the entire system uses quantum technology. The data transmitting between quantum computers should also base the quantum technology. One of the weaknesses of the data security of quantum computers is the data lines between the quantum computers.
The data security of the quantum computer is a very interesting thing. That data travels in the quantum computer in the quantum form doesn't make the system safe. The data must also travel in quantum form between quantum computers. If the quantum computer uses normal data transmissions like electric cables or radio waves that data transmission is "quite simply" to break. And the weakness of quantum computers' data security is the long-range data transmissions. The other weak spot is the system that uses the quantum computer.
The data will be input to the binary computer before it will send to the quantum level. And those computers are the same way vulnerable for hackers like other binary computers. The second weakness of quantum computers is that if they are controlling some other systems the hacker can break the communication between the quantum computer and subsystems if they are running on the binary computer.
So in the quantum system, the key element is that the entire system should build on the quantum base. And all data transmitting must happen by using the protected quantum channels. In the quantum channel, the data is protected by using another layer. The transmission can be made by using hollow laser rays, where the outer laser ray is protecting the data transmitting laser ray. And that thing denies that outer systems cannot easily detect the changes in the brightness of the laser ray.
In those visions, the hackers are using robots, eavesdropping stations, or some kind of telescope. That system is capturing the data when it travels between the quantum computer. The robot is sending the entire data to the support station which is sending it to the data center for processing. Eavesdropping of laser communication is difficult but not impossible. In real life, laser communication can break by using telescopes that measure the changes in the brightness of the laser ray. Those systems can be ground-based, airborne, or satellite-based.
They can use multi-spectral CCD cameras for tracking the laser ray. If the data transmitting laser ray is covered with another laser ray, that denies the outsider can observe changes in the brightness of the laser ray that carries data.
The system can replace lasers by using very accurately pointed radio masers. In the radio maser, the radio waves are traveling like laser rays. And the communication cannot notice from outside. The system can use the same way two internal radio rays where the outer layer is protecting the data transportation layer.
And if something turns in that channel the system recognizes if there is a cut in the data transmitting. The system should also follow the protective layer. If it is cut there is the possibility that somebody attempts to slip into the system.
The highly accurate maser-based systems can theoretically break by using quadcopters. Which is putting those radio waves travel through the ring antenna. That ring is observing the radio waves. If there is a cut in the carrier wave the system is alarmed. The small quadcopters can also bring surveillance cameras and microphones to the rooms, and they can observe the screens and talk of the people.
The requirement for the system which uses radio masers for communicating between computers and the WLAN support station is. Support station uses turning antennas that are targeted to net cards of the computers. This system requires active components like a quadcopter-based support system. The data will transmit to the quadcopter, which is positioned over the user.
And then the radio maser, that is installed to copter will send the data to the net-card, which can be the USB based system. There are many ways to make those turning antennas that are required for that kind of system. Of course, the users might have two communication systems one is for regular communication. And another is for ultra-secure communication. That is because the use of aimed antennas will decrease the capacity to connect the computers with the WLAN. So the ultra-secure data transmitting layer should reserve only for true need.
()https://visionsoftheaiandfuture.blogspot.com/
Comments
Post a Comment