Skip to main content

Unhackable Internet

 Why it matters?

 The internet is increasingly vulnerable to hacking; a quantum one would be unhackable.

Quantum Computing 

 

A quantum internet could be used to send unhackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a the quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss.

 

Now, Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information. The research is the missing link towards a practical quantum internet and a major step forward in the development of long-distance quantum networks.

 

The U.S Department of Energy (DoE) explains how a quantum link will make it happen through two quantum phenomenon: the first is quantum entanglement, where two-particle can become so inextricably linked that no matter how much distance separates them, changing the properties of one will change those of the other. And since that communication happens instantly, a quantum internet could be much faster than today’s networks. The second phenomenon is quantum superposition, where a particle can exist in two different states at once. This is what enables tighter security of the information shared across a quantum network. Information is encoded into entangled pairs of photons, in a superposition of states, in data terms that mean they represent both a one and a zero at the same time.

A quantum physics-based internet will be there soon to enable us to secure our networks used in the communication. Stephanie Wehner is leading a team at The Delft University of Technology aiming to connect Four cities in The Netherlands, entirely by means of quantum Technology. The messages sent in these network aims to be unhackable.




In these years, scientists are trying to study the behaviour of transmitting pairs of photons across fibre-optics in a way that the information encoded in them is transmitted safely. A Chinese team has already tried a form of technology by constructing a 2,000-kilometre network backbone between Beijing and Shanghai, but some parts of the project relies upon classical components that can break the Quantum link periodically by introducing a new one in the network, exposing it to the risks of hacking.

The researchers at Delft University aim to transmit information from end to end using Quantum Computing, being the first of its kind. The technology being used in this is entanglement, the quantum behaviour of atomic particles. The entangled particles cannot be covertly read without disrupting their content.

But these entangled particles are hard to create and the main challenge is they are harder to transmit over long distances. Wehner’s team has demonstrated it can send them more than 1.5 kilometres (0.93 miles), and they are confident they can set up a quantum link between Delft and the Hague by around the end of this year. Ensuring an unbroken connection over greater distances will require quantum repeaters that extend the network.

Such repeaters are currently in design at Delft and elsewhere. The first should be completed in the next five to six years, says, Wehner, with a global Quantum network following by the end of the decade.


For more exciting Technical News follow us on:  Instagram 

Comments

Post a Comment

Popular posts from this blog

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...

Difference Between Analysts and Statisticians

DIFFERENCE BETWEEN ANALYSTS AND STATISTICIANS In today’s digital landscape, data has become one of the biggest and most important assets for almost all organizations. Data can be fetched from anywhere and it’s actually transforming the way we live. Statistics and analytics are two branches of data science. Analysts specialize in exploring what’s in your data, statisticians focus more on inferring what’s beyond it. Let’s have a look at basic analytics? Try googling the weather. Whenever you use a search engine, you’re doing basic analytics. You’re pulling up weather data and looking at it. What expert analysts do? They’re all about taking a huge unexplored dataset and mining it for inspiration. Analysts are lightning-fast coders who can surf vast datasets quickly, they are data storytellers. Their mandate is to summarize interesting facts and to use data for inspiration. In some organizations those facts and that inspiration become input for human deci...

HOW TO SEE INCOGNITO HISTORY AND DELETE IT

We have heard about private or incognito browsing. It’s the mode that doesn’t store anything in history. While it does store cookies, but are deleted after the session is exited. This mode is known as Incognito browsing in Google Chrome, Private Browsing in Mozilla Firefox, and InPrivate Browsing in Internet Explorer. Whatever we may want to call it, the mode works the same in all browsers. However, sometimes we might want to go back to a page that you previously opened. The question is – can you check your incognito history? Problem is, there is no easy way to go back to that page. So all are search queries we saw is effectively lost. Unless you can Google it up and it shows again. But if it’s not there on the first page of Google, it’s gone forever. But we can still get to know about the websites that have been browsed under the incognito mode. Yes, the private browsing mode has a loophole. You can see the browsing history of someone using incognito mode but only if you h...