LT   EN   RU  
Sunday 2 April 2023 Straipsniai.lt - Independent and informative portal
Home
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 69669789
Pages in Straipsniai.lt: 40735
  
  Computers > Computer technologies > Hackers
Lankomumo reitingas Print version Print version
Toshiba puts quantum crypto into practice

The system, which has run continuously since it was set in motion last week, relies on single photons to transmit an untappable key over standard optical fibers, the company said. It is capable of delivering thousands of keys a second and can be effective over distances of more than 100 kilometers.

Toshiba said it is already in talks with a number of telecommunications companies and end users in preparation for the commercialization of the technology, which offers the possibility of significantly more secure networking.

"We're talking to a number of potential end users at the minute," said Andrew Shields, group leader of Toshiba's Cambridge, England-based Quantum Information Group. "We're planning to do some trials in the city of London next year and are targeting users in the financial sector. We've also had some interest from telcos, including MCI, with whom we've been running the installed fiber tests."

No price or launch date has been set yet, Toshiba said.

The system works by transmitting a long stream of photons modulated to represent 1s and 0s, most of which are lost along the way. These photons can be modulated in one of two ways, through two different kinds of polarization. According to Heisenberg's Uncertainty Principle, however, it is impossible to know both the kind of polarization and the data represented by the photon. The receiver has to assume one to get the other, which it will frequently get wrong.

The receiver picks up and attempts to decode a few out of those that make it, reporting back to the sender which ones it received and decoded, thus making up a key that both ends know. Any interceptor can't know what the value of those photons is, because by reading them in transit, it will destroy them. It can't replace them after reading them, because it can never know their exact details.

Toshiba has been developing special hardware to create and analyze single-photon transactions by quantum dots - effectively artificial atoms integrated with control circuitry. However, the current cryptographic equipment uses standard parts, including Peltier effect-cooled detectors operating at very low noise levels. The next generation of equipment is expected to use this new technology.

Toshiba is also looking at ways to increase the range of the systems beyond the limitations of a single fiber. Because a photon can't be intercepted and retransmitted, it's not possible for the technology to incorporate repeaters to overcome the losses in multiple segments. However, Shields said, there is a possibility that repeaters may be created using quantum teleportation - a new and still experimental effect where the quantum state of a particle can be transmitted across distances without it needing to be fully measured.

Toshiba Research Europe is part of the European SECOQC project, which is working toward the development of a global network for secure communication using quantum technology.

         
Lankomumo reitingas

Diskusijos - Discusions

Versija spausdinimui - Print version

Atgal





Random tags:    Laptops (10)    Modems (2)    Software (11)    Economics2 (2)    Cinema (20)    Religion (34)    Dragons (13)    Buddhism (10)    Energetics (2)    Cats (14)    Pedagogics (10)    V.Nabokov (54)    People (56)    Feng Shui (14)    Vampire (6)    Open source (9)    Physics (5)    Linux/Unix (2)    Tales (13)    Law (11)    Nursing (4)    Computer games (64)    Films (10)    Computers (355)    Culture (57)    Love (48)    Chess (10)    Operating systems (19)    Procesors (2)    Motorcycles (33)    Eurointegration (4)    Biology (66)    Casino’s (10)    Aquariums (28)    Philately (8)    Dolphins (6)    Wedding (10)    Sport2 (8)    Agrobusiness (2)    E - commerce (10)    History (4)    Kisses (13)    Prose (11)    Aviculture (2)    SSL certificates (10)    Printers (12)    Mysticism 2 (3)    Transport (54)    Security (22)    Skydiving (10)
1. Bill Gates and other communists
2. Wi-Fi overtakes Ethernet for home networks
3. Worm plays games with victims
4. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
5. Troy-horses infects Windows Media files?
6. iWork productivity software targets Microsoft's Office
7. Taiwan police seize 60,000 suspect AMD CPUs
8. IDC: 3 future technologies
9. Windows XP SP2 Firewall shows your files and printers to every Internet user
10. phpBB Attachment Mod: new vulnerabilities discovered
1. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
2. Taiwan police seize 60,000 suspect AMD CPUs
3. Who says safe computing must remain a pipe dream?
4. Bill Gates and other communists
5. phpBB Attachment Mod: new vulnerabilities discovered
6. iWork productivity software targets Microsoft's Office
7. Feds try to take logs from Nmap creator
8. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
9. New Internet domains in the works
10. Windows XP SP2 Firewall shows your files and printers to every Internet user
Map