Skip to main content

We must prepare for the quantum age of the internet.

Image: Pinterest


Quantum technology brings new threats but also new possibilities. 


Single-photon imaging technology can make quantum data transportation safer than ever before. 


Breaking the quantum data transportation is the theoretically easy thing. The particle will superposition in the laser ray that transports data. And the sensor detects the changes in the energy level in that superposition. This type of eavesdrop can avoid if the data transportation qubits have serial numbers. 

That means the system can have the data transportation qubits and only the numbered qubits. And if the system has let's say 7 layer qubits, or otherwise saying qubits that have 7 states. There can be security states between those layers or states. 

That means the qubit has layers 0-6(Calculation of qubit layers begins always from 0). The most out layer can use as the security state. And there can be "public layers" (4 and 5). Then there can be another security layer (layer 3). And layers 1 and 2 transport the highest secured data. If the security layers are missing the system detects that somebody is trying to read qubits without permission. 

The single-photon imaging technology is important if research wants to make more secured and more effective data transport protocols. If the system operators can store data in single photons they can send them in the laser ray to the target. This method can call selective photonic data transportation the key element is that all photons are not transporting data. Most of them are so-called "white noise" that is not containing data. And that makes breaking that data security extremely difficult. 

Breaking the quantum encrypting happens by stealing qubits from the flow. If the system uses traveling photons for the data transportation the highjacking of those photons is possible by using the superpositioned and entangled photons or electrons. When a photon hits that particle it raises the energy level of that particle. But the qubit which hits that antenna is lost. And the loss of the qubit can recognize. The idea is that if the operators notice that qubit is stolen the system will be alarmed. 


We must prepare for the quantum attack.


The robot bugs can break data security very effectively. 


The fact is that the robot bugs are opening new doors for hackers to systems, that are previously secured. The robot bug can fly to the microchip. And then it can put its antenna to the data transportation wire. The robot bug can upload captured data to the receiving station that is mounted in the small quadcopter. 

The quadcopters can fly in the ventilation tube and then travel to the computer hall. And the last one will send the robot bug to the microchip. That robot bug can also get its electricity from the microchip. 

The quadcopters can wait in the ventilation channels and make the chains where data is traveling in the laser ray. So the system can transmit data to a satellite which relays it to the supercomputer center. The laser ray can also transmit energy to the system. 


But the quantum systems are even more effective. 


The fact is that quantum systems are endangered the security of the entire internet. And if we are thinking of the RSA-based cryptology that thing is at the end of its road. The advantage of quantum computing is so fast that more and more countries can produce those systems. 

The superpositioned and entangled particle can read regular data from optic cables. If the users of that system know the position of the microchips they can use the superpositioned and entangled for capturing data straight from the microprocessor.

There are probably made experiments to eavesdrop on the data transmissions in the optic cable by using radar. When the radio wave travels through the optic fiber the energy of the laser ray will transfer to the radio impulse. And the radio receiver can detect the changes in the energy level in the radio wave. This type of system can steal data from the optic fibers. After the data is collected. It can be driven to quantum computers for code-breaking catastrophe. 

The problem with that system is this. The energy of the radio waves is transferring to photons of the laser ray. That means the laser ray will turn too high energetic. And the system can notice that. If we are thinking of this kind of situation, the thing that eavesdropping has detected makes it possible to change the plans. 

But the thing is that the RSA-based cryptology must update. And that thing should happen very soon. Quantum computers can break any code that is made by using binary computers very fast. Securing data against new threats is extremely urgent. 


()https://physicsworld.com/a/new-time-lens-could-boost-single-photon-imaging-technique/

()https://en.wikipedia.org/wiki/RSA_(cryptosystem)


()https://visionsoftheaiandfuture.blogspot.com/


Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

The breakthrough in solid-state qubits.

Hybrid integration of a designer nanodiamond with photonic circuits via ring resonators. Credit Steven Burrows/Sun Group (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) ****************************************** The next part is from ScitechDaily.com "JILA breakthrough in integrating artificial atoms with photonic circuits advances quantum computing efficiency and scalability". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "In quantum information science, many particles can act as “bits,” from individual atoms to photons. At JILA, researchers utilize these bits as “qubits,” storing and processing quantum 1s or 0s through a unique system". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "While many JILA Fellows focus on qubits found in nature, such as atoms and ions, JILA Associate Fellow and University of Colorado Boulder Assistant

First time in history, astronomers saw that a planet falls in its star. Could that be the faith of theoretical Vulcan planet?

"As the Sun becomes a true red giant, the Earth itself may be swallowed or engulfed, but it will definitely be roasted as never before. However, it remains to be seen whether any of the effects of swallowing Mercury, Venus, or even possibly Earth will be noticeable by a distant alien civilization". (BigThink.com/At last: astronomers catch a star eating its innermost planet) The planet fell into a star that it orbited, or the nova eruption of a dying star destroyed the planet. That thing proved expectations that stars can eat their planets. At least when they start to expand to red giants. In other situations, the nova eruption from the dying star can destroy the entire planetary system. The star that ate its planet was the sun-type star that ran out of its fuel. And then the Nova eruption destroyed the planet near that star.  But there is the possibility that things like gravitation brake will cause a situation in which the planet falls into its sun. The situation could be th