wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security in Quantum and Space Communication

profile
52_Samruddhi Sogam
Oct 20, 2021
0 Likes
0 Discussions
89 Reads

Quantum conversation structures are greater steady as compared to normal networks, due to the fact they depend on the quantum properties of photons, rather than computer code that can be cracked. But constructing Quantum communication structures is expensive. Laws of Quantum communication allow photons of light for transmitting data along optical cables, to take on a state of superposition, which means they can represent multiple combinations of 1 and 0 simultaneously and these particles are called as quantum bits or qubits

QKD involves sending encrypted dataas classical bits over networks, even as the keys to decrypt the records are encoded and transmitted in a quantum state using qubits.An encryption key in the form of qubits whose polarization states represent the individual bit values of the key.

Materials in cables can soak up photons, because of this that they are able to usually tour for no various tens of kilometers. In a classical network, repeaters at diverse factors alongside a cable are used to enlarge the sign to atone for this. QKD networks have give you a comparable solution, creating “depended on nodes” at diverse factors. In Quantum teleportation, it “teleports” the data in Alice’s memory qubit from her photon to Bob’s photon.The hurdles include finding reliable ways of churning out lots of linked photons on demand, and maintaining their entanglement over very long distances.

QUESS, the first-ever quantum-communication satellite launched by China,atop a Long March-2D rocket from the Jiuquan Satellite Launch Center on Aug. 15, 2016. On Mar 22, 2021, ISRO has successfully demonstrated free-space Quantum Communication over a distance of 300 metre with several technologies developed within the country.

Quantum Communication isn’t going to replace the internet very soon. Researchers have warned that even a fully quantum internet may ultimately become vulnerable to new attacks that are themselves quantum based.


Comments ()


Sign in

Read Next

Types of Threads

Blog banner

Student Grade Calculator in LISP

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

What is metaverse?

Blog banner

Cross site scripting Attack

Blog banner

Deadlock

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Memory management

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

BENIFITS OF YOGA

Blog banner

Session Hijacking

Blog banner

DBMS and various career options related to it.

Blog banner

VIRUS

Blog banner

Firewall in Computer Network

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Service transition principles

Blog banner

MOVEMBER

Blog banner

Different Types of Data

Blog banner

Network Forensics

Blog banner

Elegant fashion style

Blog banner

CRISP-DM Methodology

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

EFT

Blog banner

Virtual Memory

Blog banner

OPERATING SYSTEM

Blog banner

Threat management

Blog banner

Supervised and Unsupervised Learning

Blog banner

Process Creation

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

This too shall pass

Blog banner

INTRODUCTION

Blog banner

Game Theory in Blockchain

Blog banner

Cyber Laws In India and Around the World

Blog banner

Components of GIS

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner