Skip to main content

The data security of quantum computer systems requires that the entire system uses quantum technology.




The data security of quantum computer systems requires that the entire system uses quantum technology. The data transmitting between quantum computers should also base the quantum technology. One of the weaknesses of the data security of quantum computers is the data lines between the quantum computers. 

The data security of the quantum computer is a very interesting thing. That data travels in the quantum computer in the quantum form doesn't make the system safe. The data must also travel in quantum form between quantum computers. If the quantum computer uses normal data transmissions like electric cables or radio waves that data transmission is "quite simply" to break. And the weakness of quantum computers' data security is the long-range data transmissions. The other weak spot is the system that uses the quantum computer. 

The data will be input to the binary computer before it will send to the quantum level. And those computers are the same way vulnerable for hackers like other binary computers. The second weakness of quantum computers is that if they are controlling some other systems the hacker can break the communication between the quantum computer and subsystems if they are running on the binary computer. 

So in the quantum system, the key element is that the entire system should build on the quantum base. And all data transmitting must happen by using the protected quantum channels. In the quantum channel, the data is protected by using another layer. The transmission can be made by using hollow laser rays, where the outer laser ray is protecting the data transmitting laser ray. And that thing denies that outer systems cannot easily detect the changes in the brightness of the laser ray. 

In those visions, the hackers are using robots, eavesdropping stations, or some kind of telescope. That system is capturing the data when it travels between the quantum computer. The robot is sending the entire data to the support station which is sending it to the data center for processing.  Eavesdropping of laser communication is difficult but not impossible. In real life, laser communication can break by using telescopes that measure the changes in the brightness of the laser ray. Those systems can be ground-based, airborne, or satellite-based. 

They can use multi-spectral CCD cameras for tracking the laser ray. If the data transmitting laser ray is covered with another laser ray, that denies the outsider can observe changes in the brightness of the laser ray that carries data. 

The system can replace lasers by using very accurately pointed radio masers. In the radio maser, the radio waves are traveling like laser rays. And the communication cannot notice from outside. The system can use the same way two internal radio rays where the outer layer is protecting the data transportation layer. 

And if something turns in that channel the system recognizes if there is a cut in the data transmitting. The system should also follow the protective layer. If it is cut there is the possibility that somebody attempts to slip into the system. 

The highly accurate maser-based systems can theoretically break by using quadcopters. Which is putting those radio waves travel through the ring antenna. That ring is observing the radio waves. If there is a cut in the carrier wave the system is alarmed. The small quadcopters can also bring surveillance cameras and microphones to the rooms, and they can observe the screens and talk of the people. 

The requirement for the system which uses radio masers for communicating between computers and the WLAN support station is. Support station uses turning antennas that are targeted to net cards of the computers. This system requires active components like a quadcopter-based support system. The data will transmit to the quadcopter, which is positioned over the user. 

And then the radio maser, that is installed to copter will send the data to the net-card, which can be the USB based system. There are many ways to make those turning antennas that are required for that kind of system. Of course, the users might have two communication systems one is for regular communication. And another is for ultra-secure communication. That is because the use of aimed antennas will decrease the capacity to connect the computers with the WLAN. So the ultra-secure data transmitting layer should reserve only for true need.  

()https://visionsoftheaiandfuture.blogspot.com/

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

The breakthrough in solid-state qubits.

Hybrid integration of a designer nanodiamond with photonic circuits via ring resonators. Credit Steven Burrows/Sun Group (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) ****************************************** The next part is from ScitechDaily.com "JILA breakthrough in integrating artificial atoms with photonic circuits advances quantum computing efficiency and scalability". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "In quantum information science, many particles can act as “bits,” from individual atoms to photons. At JILA, researchers utilize these bits as “qubits,” storing and processing quantum 1s or 0s through a unique system". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "While many JILA Fellows focus on qubits found in nature, such as atoms and ions, JILA Associate Fellow and University of Colorado Boulder Assistant

First time in history, astronomers saw that a planet falls in its star. Could that be the faith of theoretical Vulcan planet?

"As the Sun becomes a true red giant, the Earth itself may be swallowed or engulfed, but it will definitely be roasted as never before. However, it remains to be seen whether any of the effects of swallowing Mercury, Venus, or even possibly Earth will be noticeable by a distant alien civilization". (BigThink.com/At last: astronomers catch a star eating its innermost planet) The planet fell into a star that it orbited, or the nova eruption of a dying star destroyed the planet. That thing proved expectations that stars can eat their planets. At least when they start to expand to red giants. In other situations, the nova eruption from the dying star can destroy the entire planetary system. The star that ate its planet was the sun-type star that ran out of its fuel. And then the Nova eruption destroyed the planet near that star.  But there is the possibility that things like gravitation brake will cause a situation in which the planet falls into its sun. The situation could be th