{"id":19232,"date":"2018-12-15T17:02:33","date_gmt":"2018-12-15T16:02:33","guid":{"rendered":"http:\/\/blog.netspark.de\/?p=19232"},"modified":"2020-10-18T23:02:55","modified_gmt":"2020-10-18T21:02:55","slug":"quantum-cryptography-established","status":"publish","type":"post","link":"https:\/\/blog.netspark.de\/?p=19232","title":{"rendered":"Quantum cryptography established!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-Post-Thumb wp-image-19233\" src=\"https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Quantocrypt-64x64.png\" alt=\"\" width=\"64\" height=\"64\" srcset=\"https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Quantocrypt-64x64.png 64w, https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Quantocrypt-150x150.png 150w, https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Quantocrypt.png 256w\" sizes=\"auto, (max-width: 64px) 100vw, 64px\" \/>In Austria a team of four scientists have managed to<br \/>\ncommunicate with each other over a fully encrypted<br \/>\nchannel using Quantum cryptography. This might be<br \/>\nthe first step into the next-step secure communication<\/p>\n<p><!--more--><\/p>\n<table style=\"width: 640px; height: 44px; border: 0px none; padding: 0px; border-spacing: 0px;\">\n<tbody>\n<tr style=\"height: 22px;\">\n<td style=\"width: 532px; height: 22px;\">Their publication has been <a href=\"https:\/\/www.nature.com\/articles\/s41586-018-0766-y\" target=\"_blank\" rel=\"noopener noreferrer\">submitted to the british science journal Nature<\/a><\/td>\n<td style=\"width: 16px; height: 22px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-19234\" src=\"https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Paywall-64x64.png\" alt=\"Paywall\" width=\"16\" height=\"16\" srcset=\"https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Paywall-64x64.png 64w, https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Paywall-150x150.png 150w, https:\/\/blog.netspark.de\/wp-content\/uploads\/2018\/12\/Paywall.png 256w\" sizes=\"auto, (max-width: 16px) 100vw, 16px\" \/><\/td>\n<td style=\"width: 92px; height: 22px;\">where they<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 640px; height: 22px;\" colspan=\"3\">have presented their network architecture.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>They also state that he expansion of the network is fairly easy allowing to add multiple people or network nodes for communication amongst each other with total encryption. As the quantum parts can be split and sent over a far distance and then re-aligned again maintaining the same consistence as they had before, the important part is that during the transfer process they have an undefined consistence which means one quantum part without the other is totally worthless yet hard to filter. And even if they get realigned using different consistences, the other counterpart can re-adapt to the one quantum part and restore it&#8217;s origin consistence.<\/p>\n<p>In this way, it is possible to produce bugproof transmitter and receiver keys. Since only single light particles (photons) are exchanged for this purpose, the key can not be intercepted &#8211; because according to the laws of quantum physics, it is impossible to copy the quantum state of a single light particle without error. Therefore, an eavesdropper can not obscure his presence and would betray himself immediately. The encrypted message is then exchanged in the classical way.<\/p>\n<p>So far, in this way, according to the scientists mostly only two participants could be connected with a guaranteed tap-proof line. Other connections are complicated, error-prone and subject to communication restrictions. The team now supplied four subscribers from a central source with entangled photons, so that all four could create and use cryptographic keys together for secure communication.<\/p>\n<p>S\u00f6ren Wengerowsky, first author of the study, describes the next steps of the experiment:<\/p>\n<div class=\"post_quote\">The photon pairs are generated as in a rainbow, which allows us to distribute them unambiguously among the participants. Each participant then makes a measurement of the polarization of their photon.<\/div>\n<p>Rupert Ursin of the Astrian Academy of Sciences says:<\/p>\n<div class=\"post_quote\">A significant adantage of this architecture is it&#8217;s flexibility! We&#8217;re now able to integrate new communication partners into the Quanum network with only minimal interception. This prooves that Quantom networks can become real &#8211; for everyone!<\/div>\n<p>In the future, it will be possible to set up such comprehensive networks that all users, even over long distances, will be able to communicate with each other without the risk of eavesdropping. This is a prerequisite for the development of a quantum Internet. In further experiments, the researchers now aim to demonstrate the expandability of the new quantum network architecture. In the global race to develop a quantum Internet, at least one thing is clear: Alice and Bob will soon be able to network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Austria a team of four scientists have managed to communicate with each other over a fully encrypted channel using Quantum cryptography. This might be the first step into the next-step secure communication<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[55,3,3240,2949],"tags":[334,3445,1715,3446,481],"class_list":["post-19232","post","type-post","status-publish","format-standard","hentry","category-computer-2","category-news","category-science","category-technology","tag-austria","tag-cryptography","tag-encryption","tag-quantum-technology","tag-vienna"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/posts\/19232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19232"}],"version-history":[{"count":0,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/posts\/19232\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=19232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=19232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}