• Home
  • About
  • Advertise
  • Careers
  • Privacy Policy
TechAtLast
  • How to Guide
  • Disruption
  • IoT (Internet of Things)
  • Blockchain Technology
  • CyberSecurity
  • Hack
No Result
View All Result
  • How to Guide
  • Disruption
  • IoT (Internet of Things)
  • Blockchain Technology
  • CyberSecurity
  • Hack
No Result
View All Result
TechAtLast
No Result
View All Result

Quantum cryptography; an untangled guide to the future of cybersecurity

Olawale Daniel by Olawale Daniel
June 24, 2020
in Computer Tips & Tutorials, CyberSecurity, Information and Communication Technology (ICT)
2

As our lives become increasingly more digital, new opportunities for hacking, impersonating, and thefts arise. Current encryption techniques are far from perfect and might soon prove obsolete at the hands of phenomena we do not fully understand.

Step into the unknown

From wristwatches to the supercomputers that run the Large Hadron Collider, all modern electronic devices use binary code, a two-symbol system consisting of 0s and 1s. The vision for new technology, however, is founded on quantum bits, widely known as qubits. Typically taking the form of photons and electrons, qubits are units of encoded quantum information. When harnessed, these subatomic particles will offer the raw processing power and security, the likes of which we’ve never experienced. But how? In order to dive deeper into the abstract, we must first take a look at the history of quantum physics.

A short history lesson on Quantum cryptography

Quantum cryptography; an untangled guide to the future of cybersecurity
Today’s available encryption techniques are still in working mode but might soon prove to be obsolete. Quantum cryptography offers an untangled guide to the future of cybersecurity and we might be living in heaven already with it!

The year was 1900, and physicist Max Planck had just presented his quantum theory to the German Physical Society. Planck proposed that energy, just like matter, was made up of individual units. 5 years later, Albert Einstein theorized that radiation could also be observed in a similar manner. This eventually led to the proposition in 1924 that particles can behave like waves and vice versa – known as Louis de Broglie’s principle of wave-particle duality.

No more than 3 years later, Werner Heisenberg came up with what became known as the uncertainty principle, where he proposed that a precise measurement of two complementary values was impossible, e.g. the position and momentum of a subatomic particle. Its notion defied the mathematical laws of nature, prompting one of Einstein’s most famous quotes,

“God does not play dice with the universe”.

What do a cat and a physicist have in common?

Over the years, the most powerful theoretical minds have contributed to our understanding of quantum theory – a process that is still ongoing. To this day, however, one of the most commonly taught interpretations of quantum mechanics is that of Niels Bohr and Werner Heisenberg, devised from 1925 to 1927. Known as the Copenhagen interpretation, their work claimed that no object in the universe can be assumed to have specific properties until it is measured. This concept became known as superposition.

Superposition is best explained through the paradox of Schrodinger’s Cat, named after physicist Erwin Schrodinger. To visualize the concept, imagine a cat in a sealed box with a vial of poison inside. We cannot know whether the animal is dead or alive until we open the box, so during this period of uncertainty, it is both dead and alive. By the same token, a qubit can exist in all possible states until it is measured.

Brothers in arms

Described by Einstein as “spooky action at a distance’, entanglement is a key phenomenon in quantum physics that signifies a shared, quantum state between a pair or group of qubits that makes each member of the pair or group inherently dependent on the others. In entanglement, a change in the state of one qubit immediately affects the others in a predictable way, for instance, in a pair of qubits with a measured total spin of zero, when one is known to have a clockwise spin, the other qubit must then have a relative counter-clockwise spin. What is interesting about entanglement is that so far no one has been able to explain exactly how or why it occurs. Spooky.

Absolute power

The practical application of quantum theory is a tantalizing prospect for technological breakthroughs, particularly in computing. Thanks to superposition, quantum computers can perform calculations for multiple possibilities simultaneously, as opposed to the one-at-a-time nature of digital machines. Furthermore, while conventional computers require additional bits to increase their processing capabilities, quantum computers use entangled qubits to provide unparalleled efficiency and raw power. The implications are colossal, spanning across fields and industries. From molecular modeling to forecasting in weather and finance, from machine learning in the automotive and medicine to particle physics, the future does look bright.

What’s the catch?

China launches world's 1st #quantum #satellite, which could establish "hack-proof" communications pic.twitter.com/4vpGJZ4fH8

— China Xinhua News (@XHNews) August 16, 2016

China is one of the main players in quantum research, having recently used its Micius satellite to successfully beam entangled pairs of photons to three optical telescopes over a record 1,203 kilometers, besting the previous record by almost 1,100 kilometers. Unfortunately, only one pair of photons out of the 6 million beamed each second survived the journey through our atmosphere. This is because even the smallest change in the environment, like a loud noise, can destroy quantum properties and result in computational errors – an occurrence known as decoherence.

To maintain their unique properties, qubits should be kept inside vacuum chambers at all times, having limited to no interaction with outside stimuli, which isn’t always possible. Decoherence is one of the biggest challenges to unlocking the full potential of quantum mechanics, but the prize for overcoming it is everything. The global leader in quantum computing is going to have an unthinkable advantage over the rest of the world. It’s a sprint, not a marathon.

What if I told you…

The world’s most popular encryption technique has many flaws that make it prone to interception and decryption. The effectiveness of RSA encryption relies on the difficulty of solving multi-factor problems involving large prime numbers. RSA keys, needed to access the encrypted message, are constantly at risk of factoring attacks, making them an easy target for quantum computers thanks to their multi-problem solving properties. The solution? Quantum networks. When operational, these will most likely be a specialized branch of the world wide web, offering secure data transfer, and more, to future you.

The knight in shining armour

But we do not have to wait 10 years for our data to be secure. Quantum cryptography is already here in the form of Quantum Key Distribution or QKD for short. QKD uses the principles of superposition to create an encryption system based on physics rather than, traditionally, mathematics. In order to relay information securely, the sender creates an encryption key using qubits, which are sent to the recipient. The sender and recipient then use key sifting to determine whether the operation was successful. Had the encoded qubit been measured by a third-party, the sender and recipient of the data would both be alerted by the collapse of the entire operation due to decoherence. The security of this encryption technology combined with the ability to sound an alarm when jeopardized is revolutionary for cybersecurity.

TBC

In a perfect world, the new ceiling in cybersecurity would make our planet an objectively better place. Quantum communication would provide freedom and security for those under suppressive governments. The safety of financial transactions would be at an all-time high thanks to quantum cryptography. We would be able to get in touch with our friends and family in total privacy via quantum networks. The subsequent developments in artificial intelligence would bring us closer to technological singularity, where miraculous advances would happen on an almost daily basis. Our grandchildren might even call it the “quantum age”. Sounds great, doesn’t it?

Tags: Albert Einsteinbinary codeCalculationCyber SecurityDigital MachinesMathematicsProcessing UnitQuantumquantum computersQuantum Cryptographyquantum mechanicsQuantum Principlequantum theoryqubitsSupercomputerSuperpositiontheoryworld wide web
Previous Post

The Brainstorm: 7 AI Future predictions report 2020

Next Post

A Guide to Establishing an Online Learning and Teaching Marketplace

Next Post

Notice: Undefined index: jnews-75x75 in /home/olawaled/domains/techatlast.com/public_html/wp-content/themes/jnews/class/Image/Image.php on line 93

Notice: Trying to access array offset on value of type null in /home/olawaled/domains/techatlast.com/public_html/wp-content/themes/jnews/class/Image/ImageLazyLoad.php on line 100

A Guide to Establishing an Online Learning and Teaching Marketplace

Comments 2

  1. John Ejiroh says:
    2 years ago

    Wow, I love this post. Quantum technology has come to stay.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Posts

  • Effective Strategies for Combating Social Engineering Attacks through Assessment Services
  • AI and Security: Safeguarding Mobile Apps from Emerging Threats
  • How English to Chinese Translation Singapore Facilitates Success in the Chinese Market?
  • Unlock Success: Create Your Own Uber-Like App with Taxi Booking Software
  • Microservices Architecture: Redefining Software Development in 2023

Recent Comments

  1. Olawale Daniel on How Salesforce Einstein Bots Are Transforming Customer Service Interactions?
  2. Olawale Daniel on How English to Chinese Translation Singapore Facilitates Success in the Chinese Market?
  3. Sayes on How English to Chinese Translation Singapore Facilitates Success in the Chinese Market?
  4. subhash pal on How Salesforce Einstein Bots Are Transforming Customer Service Interactions?
  5. Cynthia David on About

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • November 2022
  • October 2022
  • September 2022
  • June 2022
  • May 2022
  • April 2022
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • March 2011
  • June 2010

Categories

  • Africa
  • Android Fans
  • Apple iOS
  • Application Design and Development (Mobile or Desktop)
  • Asia
  • Australia
  • Biz Branding & Customization
  • Blockchain Technology
  • Blogging Tips
  • Charity
  • Chrome
  • Cloud Computing Technologies and Resources
  • CMS
  • Computer Tips & Tutorials
  • CyberSecurity
  • Cycling
  • Data Theft
  • Designs & Invention
  • Discovery
  • Disruption
  • Education
  • Energy
  • Europe
  • Featured
  • Football
  • Freebies
  • Games
  • Gizmos
  • Green Energy
  • Hack
  • Healthcare & Healthy Living
  • How to Guide
  • Infographic
  • Information and Communication Technology (ICT)
  • Internet Access
  • Interview
  • IoT (Internet of Things)
  • Marketing
  • Mobile App
  • Money & Finance
  • Motoring
  • Mozilla
  • News
  • Operating System (Computer or Mobile)
  • P.C.
  • Plugins
  • Product Reviews
  • Programming
  • Racing
  • Real Estate
  • Social Media
  • Software
  • Startups
  • Themes
  • Today In History
  • Tourism
  • Uncategorized
  • Video Sharing
  • Web Banner Design (Ads Concepts)
  • Web Development & Design Ideas
  • Web Hosting
  • Windows 10
  • Windows 8
  • Womens
  • Home

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • About
  • Advertise

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.