Skip to main content

How to send qubit in the long range?



All encryption systems have one weakness,  humans created them. And all humans make mistakes. How to send qubit in the long range? 


Can quantum cryptography be the next-generation communication tool? The answer is yes. The information that qubit involves may send in over long distances by using regular radios. The system works like this. Every single qubit's state will transmit to the receiver by using a unique radio frequency. 

In that system, the information will send to the receiver by using multiple radio frequencies, And the system cuts the message into pieces. That is sent precisely at the same moment. That means the ELINT men must capture messages from all frequencies that the transmitter uses. The use of multiple frequencies at the same time makes the message so short that part of it would not capture anyway. 

The receiving system will reassemble or resort to the information bites. The system can use serial numbers in the bites of the message. Those serial numbers allow the receiving system put those bites back in order. 


The diagram below portrays the model of the ultra-secure binary data transmission. 


*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

*=The encryption algorithm that can be unique for each data carrier byte. 

-=The data carrier byte. In that system, the receiving system can use the different encryption keys for opening every individual data-carrier byte. And those data-carrier bytes can send by using different radio frequencies. 


There is no unbreakable code. 


Modern encryption systems can cover all bytes that are traveling in the network by using unique code. In that model behind and after the information-carrier byte travels the encryption code. The ultra-secure quantum systems can involve multiple layers of encryption. The most out layer is the quantum system but also binary code can be protected by using encryption. And those systems still can be broken. 

The problem with all codes and encryption systems is. That they are all made by humans. This means that there is always a weak point in the encryption systems. If there is no weak point in the system itself. There are people, who are using computers. The attacker can track those people and use some drugs to make them tell what is in messages that certain computers or operators handle. 

Or the attacker can slip things like surveillance cameras into the computer room, and then that camera sends all data from the screens to the attacker. That means if you cannot go through the encryption you can always go around them and use alternative methods to break the code. And in this text term "breaking the code" means the ability to steal information. 

Stealing information is the objective of hackers. Cryptology is the race between code makers and code breakers. The first-generation systems were just kicking the intruders off the system when security tracked them. But the new AI-based systems use things called "honey pots". The honey pots are databases where is a certain type of information. But the vital part of that data is removed. Modern systems also inform their users about the anomalies of the user's behavior in the system. 


Honey pots are traps. They can send tracking cookies to attackers' computers.


But they can also make a profile of the intruder. The data that the intruder searches uncover what kind of data interests the hacker. And that data helps to find out the people who are cooperating with the hacker. The drug dealers and mafia men are interested in different types of information than the governmental security and intelligence services. 

The thing that makes quantum cryptology hard to break is that data is traveling in the form of the qubit. Qubit bases the superposition of the partciles. So in quantum systems data is packed in physical form. And the thing that makes quantum cryptology secure is that the data is lost from the qubit if somebody tries to steal it. 

So the user of the system knows if the qubit is stolen. And that gives a warning to the operators. But as I wrote the quantum systems can also leak. There is the possibility that somebody just drinks too much alcohol. And tells all secretive information to unauthorized people. 


Comments

Popular posts from this blog

Quantum breakthrough: stable quantum entanglement at room temperature.

"Researchers have achieved quantum coherence at room temperature by embedding a light-absorbing chromophore within a metal-organic framework. This breakthrough, facilitating the maintenance of a quantum system’s state without external interference, marks a significant advancement for quantum computing and sensing technologies". (ScitechDaily, Quantum Computing Breakthrough: Stable Qubits at Room Temperature) Japanese researchers created stable quantum entanglement at room temperature. The system used a light-absorbing chromophore along with a metal-organic framework. This thing is a great breakthrough in quantum technology. The room-temperature quantum computers are the new things, that make the next revolution in quantum computing. This technology may come to markets sooner than we even think. The quantum computer is the tool, that requires advanced operating- and support systems.  When the support system sees that the quantum entanglement starts to reach energy stability. I

The anomalies in gravity might cause dark energy.

"Physicists at UC Berkeley immobilized small clusters of cesium atoms (pink blobs) in a vertical vacuum chamber, then split each atom into a quantum state in which half of the atom was closer to a tungsten weight (shiny cylinder) than the other half (split spheres below the tungsten). (ScitechDaily, Beyond Gravity: UC Berkeley’s Quantum Leap in Dark Energy Research) By measuring the phase difference between the two halves of the atomic wave function, they were able to calculate the difference in the gravitational attraction between the two parts of the atom, which matched what is expected from Newtonian gravity. Credit: Cristian Panda/UC Berkeley" (ScitechDaily, Beyond Gravity: UC Berkeley’s Quantum Leap in Dark Energy Research) Researchers at Berkeley University created a model that can explain the missing energy of the universe. The idea is that the particles and their quantum fields are whisk-looking structures. Those structures form the superstrings that are extremely thi

Neon and time crystals can be the new tools for quantum computing.

"New research investigates the electron-on-solid-neon qubit, revealing that small bumps on solid neon surfaces create stable quantum states, enabling precise manipulation. This research, supported by multiple foundations, emphasizes the importance of optimizing qubit fabrication, moving us closer to practical quantum computing solutions." (ScitechDaily, Quantum Riddle Solved? How Solid Neon Qubits Could Change Computing Forever) Researchers created a superposition in solid neon. And those neon ions, where the system creates superposition in their surfaces.  Making it possible to manipulate those atoms. The atom-based qubit has one problem. Orbiting electrons cause turbulence in their quantum fields. The thing that can solve the problem is to use the quantum fields for the superposition.  If the system can position electrons at a certain point, it can make a small hill to the atom's surface. And the system can use that thing for making quantum superposition between the mos