wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security in Quantum and Space Communication

profile
52_Samruddhi Sogam
Oct 20, 2021
0 Likes
0 Discussions
89 Reads

Quantum conversation structures are greater steady as compared to normal networks, due to the fact they depend on the quantum properties of photons, rather than computer code that can be cracked. But constructing Quantum communication structures is expensive. Laws of Quantum communication allow photons of light for transmitting data along optical cables, to take on a state of superposition, which means they can represent multiple combinations of 1 and 0 simultaneously and these particles are called as quantum bits or qubits

QKD involves sending encrypted dataas classical bits over networks, even as the keys to decrypt the records are encoded and transmitted in a quantum state using qubits.An encryption key in the form of qubits whose polarization states represent the individual bit values of the key.

Materials in cables can soak up photons, because of this that they are able to usually tour for no various tens of kilometers. In a classical network, repeaters at diverse factors alongside a cable are used to enlarge the sign to atone for this. QKD networks have give you a comparable solution, creating “depended on nodes” at diverse factors. In Quantum teleportation, it “teleports” the data in Alice’s memory qubit from her photon to Bob’s photon.The hurdles include finding reliable ways of churning out lots of linked photons on demand, and maintaining their entanglement over very long distances.

QUESS, the first-ever quantum-communication satellite launched by China,atop a Long March-2D rocket from the Jiuquan Satellite Launch Center on Aug. 15, 2016. On Mar 22, 2021, ISRO has successfully demonstrated free-space Quantum Communication over a distance of 300 metre with several technologies developed within the country.

Quantum Communication isn’t going to replace the internet very soon. Researchers have warned that even a fully quantum internet may ultimately become vulnerable to new attacks that are themselves quantum based.


Comments ()


Sign in

Read Next

How to kiss

Blog banner

Android Flashlight Application

Blog banner

Blog on Smartsheet.

Blog banner

Starvation and Deadlock.

Blog banner

CyberSecurity Color Wheel

Blog banner

History of Money

Blog banner

Social Engineering

Blog banner

security controls

Blog banner

Deadlock in Operating System

Blog banner

Modern Operating Systems.

Blog banner

MEMORY HIERARCHY

Blog banner

Password Generator - Lisp

Blog banner

Art and Culture of Rajasthan

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

OS ASSIGNMENT

Blog banner

virtual machine

Blog banner

Traditional UNIX Scheduling

Blog banner

note taker app

Blog banner

Depression

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Deadlock and Starvation

Blog banner

Article on Zoho Corporation

Blog banner

Zoho

Blog banner

social media issue

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

What is Spyware?

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

(Input/Output) in os

Blog banner

Virtual Machine's

Blog banner

File system implementation

Blog banner

Hash password! Is it really secured?

Blog banner

Virtual memory

Blog banner

Modern Operating Systems

Blog banner

Rapido

Blog banner

File management in os

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner