‘Game-changing’ quantum breakthrough paves way for safer online communication

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"111265417"&NewLine;&Tab;&Tab; data-section&equals;"2">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div><p>The world is one step closer to having a totally secure internet and an answer to the growing threat of cyber-attacks&comma; according to scientists&period;<&sol;p>&NewLine;<p>A prototype&comma; designed by a team at the University of Bristol&comma; could transform the security of online communication for millions of people across the globe&period;<&sol;p>&NewLine;<p><&excl;--Ads1--><&sol;p>&NewLine;<p>By harnessing the laws of physics&comma; it can make messages completely safe from interception while also overcoming major challenges which have previously limited advances in little used but much-hyped quantum technology&period;<&sol;p>&NewLine;<p>Lead author Siddarth Joshi said&colon; &OpenCurlyDoubleQuote;This represents a massive breakthrough and makes the quantum internet a much more realistic proposition&period;<br &sol;>&NewLine;Until now&comma; building a quantum network has entailed huge cost&comma; time and resource&comma; as well as often compromising on its security&comma; which defeats the whole purpose&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;Our solution is scalable&comma; relatively cheap and&comma; most important of all&comma; impregnable&period; That means it’s an exciting game-changer and paves the way for much more rapid development and widespread rollout of this technology&period;”<&sol;p>&NewLine;<p>The internet relies on complex codes to protect information&comma; but hackers are increasingly adept at outsmarting such systems&comma; leading to cyber-attacks across the world which cause major privacy breaches and fraud running into trillions of pounds annually&period;<&sol;p>&NewLine;<p>With such costs projected to rise dramatically&comma; the case for finding an alternative is compelling&comma; and quantum has for decades been hailed as the revolutionary replacement to standard encryption techniques&period;<&sol;p>&NewLine;<p>Physicists have so far developed a form of secure encryption&comma; known as quantum key distribution&comma; in which particles of light called photons are transmitted&period;<br &sol;>&NewLine;The process allows two parties to share&comma; without risk of interception&comma; a secret key used to encrypt and decrypt information&comma; but to date the technique has only been effective between two users&period;<&sol;p>&NewLine;<p><&excl;--Ads2--><&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;Until now&comma; efforts to expand the network have involved vast infrastructure and a system which requires the creation of another transmitter and receiver for every additional user&comma;” Dr Joshi said&period;<br &sol;>&NewLine;&OpenCurlyDoubleQuote;Sharing messages in this way&comma; known as trusted nodes&comma; is just not good enough because it uses so much extra hardware which could leak and would no longer be totally secure&period;”<&sol;p>&NewLine;<p>The team’s quantum technique applies a seemingly magical principle&comma; called entanglement&comma; which Albert Einstein described as &OpenCurlyDoubleQuote;spooky action at a distance”&period;<br &sol;>&NewLine;It exploits the power of two particles in separate locations&comma; potentially thousands of miles apart&comma; to simultaneously mimic each other&period;<&sol;p>&NewLine;<p>This presents far greater opportunities for quantum computers&comma; sensors and information processing&period;<br &sol;>&NewLine;The team created a network for eight users using eight receiver boxes&comma; whereas the old method would need the number of users multiplied many times – in this case&comma; amounting to 56 boxes&period;<&sol;p>&NewLine;<p>As user numbers grow&comma; the logistics become increasingly unviable under the old system – for instance&comma; 100 users would need 9&comma;900 receiver boxes&period; Where previous quantum systems have taken years to build&comma; at a cost of millions or even billions of pounds&comma; the new network was created within months for less than £300&comma;000&period;<&sol;p>&NewLine;<p>– The paper&comma; A trusted node-free eight-user metropolitan quantum communication network&comma; is published in the journal Science Advances&period;<&sol;p>&NewLine;<p><&excl;--Ads3--><&sol;p>&NewLine;&Tab;&Tab;&Tab;<div style&equals;"padding-bottom&colon;15px&semi;" class&equals;"wordads-tag" data-slot-type&equals;"belowpost">&NewLine;&Tab;&Tab;&Tab;&Tab;<div id&equals;"atatags-dynamic-belowpost-68edba00a35b1">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<script type&equals;"text&sol;javascript">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback &equals; function &lpar;&rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; false &equals;&equals;&equals; &lpar; window&period;isWatlV1 &quest;&quest; false &rpar; &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&sol;&sol; Use Aditude scripts&period;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings &equals; window&period;tudeMappings &vert;&vert; &lbrack;&rsqb;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings&period;push&lpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;divId&colon; 'atatags-dynamic-belowpost-68edba00a35b1'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;format&colon; 'belowpost'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; document&period;readyState &equals;&equals;&equals; 'loading' &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;document&period;addEventListener&lpar; 'DOMContentLoaded'&comma; window&period;getAdSnippetCallback &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; else &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback&lpar;&rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;script>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>


Discover more from London Glossy Post

Subscribe to get the latest posts sent to your email.

- Advertisement -
Exit mobile version