Skip to main content

The data security of quantum computer systems requires that the entire system uses quantum technology.




The data security of quantum computer systems requires that the entire system uses quantum technology. The data transmitting between quantum computers should also base the quantum technology. One of the weaknesses of the data security of quantum computers is the data lines between the quantum computers. 

The data security of the quantum computer is a very interesting thing. That data travels in the quantum computer in the quantum form doesn't make the system safe. The data must also travel in quantum form between quantum computers. If the quantum computer uses normal data transmissions like electric cables or radio waves that data transmission is "quite simply" to break. And the weakness of quantum computers' data security is the long-range data transmissions. The other weak spot is the system that uses the quantum computer. 

The data will be input to the binary computer before it will send to the quantum level. And those computers are the same way vulnerable for hackers like other binary computers. The second weakness of quantum computers is that if they are controlling some other systems the hacker can break the communication between the quantum computer and subsystems if they are running on the binary computer. 

So in the quantum system, the key element is that the entire system should build on the quantum base. And all data transmitting must happen by using the protected quantum channels. In the quantum channel, the data is protected by using another layer. The transmission can be made by using hollow laser rays, where the outer laser ray is protecting the data transmitting laser ray. And that thing denies that outer systems cannot easily detect the changes in the brightness of the laser ray. 

In those visions, the hackers are using robots, eavesdropping stations, or some kind of telescope. That system is capturing the data when it travels between the quantum computer. The robot is sending the entire data to the support station which is sending it to the data center for processing.  Eavesdropping of laser communication is difficult but not impossible. In real life, laser communication can break by using telescopes that measure the changes in the brightness of the laser ray. Those systems can be ground-based, airborne, or satellite-based. 

They can use multi-spectral CCD cameras for tracking the laser ray. If the data transmitting laser ray is covered with another laser ray, that denies the outsider can observe changes in the brightness of the laser ray that carries data. 

The system can replace lasers by using very accurately pointed radio masers. In the radio maser, the radio waves are traveling like laser rays. And the communication cannot notice from outside. The system can use the same way two internal radio rays where the outer layer is protecting the data transportation layer. 

And if something turns in that channel the system recognizes if there is a cut in the data transmitting. The system should also follow the protective layer. If it is cut there is the possibility that somebody attempts to slip into the system. 

The highly accurate maser-based systems can theoretically break by using quadcopters. Which is putting those radio waves travel through the ring antenna. That ring is observing the radio waves. If there is a cut in the carrier wave the system is alarmed. The small quadcopters can also bring surveillance cameras and microphones to the rooms, and they can observe the screens and talk of the people. 

The requirement for the system which uses radio masers for communicating between computers and the WLAN support station is. Support station uses turning antennas that are targeted to net cards of the computers. This system requires active components like a quadcopter-based support system. The data will transmit to the quadcopter, which is positioned over the user. 

And then the radio maser, that is installed to copter will send the data to the net-card, which can be the USB based system. There are many ways to make those turning antennas that are required for that kind of system. Of course, the users might have two communication systems one is for regular communication. And another is for ultra-secure communication. That is because the use of aimed antennas will decrease the capacity to connect the computers with the WLAN. So the ultra-secure data transmitting layer should reserve only for true need.  

()https://visionsoftheaiandfuture.blogspot.com/

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...