1 / 7

A quantum leap: Researchers create super-secure computer network

A quantum leap: Researchers create super-secure computer network. Seungjai Min Hansang Bae Hwanjo Heo. Quantum Cryptography?. Uses light particles, photons through optical fiber instead of electric waves on wire

munin
Télécharger la présentation

A quantum leap: Researchers create super-secure computer network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo

  2. Quantum Cryptography? • Uses light particles, photons through optical fiber instead of electric waves on wire • A defining discovery in physics: that subatomic particles can exist in multiple states at once until something interacts with them. • Eavesdropping on the photons, such as setting up a photo detector to read the code, makes the codes unusable and can be detected.

  3. Basic Idea

  4. Quantum Key Distribution • Core aspect of quantum networking • Two parties share a key obtained by QKD before data communication • Separated in two channels: quantum channel and public channel • Uses different polarization of a photon to encode a bit • Example protocols: BB84, B92

  5. Working Examples • The Boston network(BBN – Havard – Boston university) is the first internet-integrated system. • A group in Europe recently made the first quantum encrypted bank transaction. • MagiQ Technologies and id Quantique are selling commercial QKD systems.

  6. Pros & Cons • Nearly Impossible to steal, even with a super-powered computer • Detect if someone is listening • “Secure” – randomness, no cloning • Distance Limitations • Availability • Expensive (MagiQ sells it at $50,000 per piece) • Vulnerable to DOS • Keys can’t keep up with data transmission

  7. Questions?

More Related