We use cookies to improve your experience on our site. By using our site you consent cookies. Privacy Policy.

Categories

Addiction & Detox
Apollo 11 Lunar Mission
Bacteria
Chakra Balance
Chronic Fatigue
Common Cold
Diseases
Electromagnetic Energy
Energy Centers
Epstein-Barr Virus
Featured
Fungi
Galen Hieronymus
Great Scientists
Hepatitis Virus
Herpes Virus
HIV Virus
Hormonal Imbalance
Influenza Virus
Introductory Articles
Lyme Disease
Malaria
Media
Minerals
Miracles
Neurotransmitters
Nutrition
OM Prakash Network HIV Testimonials
Pathogen Cleanse
PCR Test Results
Pet Health
Phoenix Voyage
Photographic Force Field
Plant Care
Programs
Quantum Physics
Scalar Energy
Scalar Light Scientists
Scalar Light Specific
Science
Shared
Shingles Virus
Superbugs
Testimonials & PCR Tests
Testimonials and Case Studies
The Digestive System
Tom Paladino's Articles
Uncategorized
Useful Reads
Video Testimonials
Videos
Viruses
Weight Loss
Wellness
podcast
pathogenic cleanse
tom paladino
pathogen cleanse
bacteria
pcr test results
scalar light sessions
standard scalar sessions
hiv virus
om prakash
herpes
india
delhi
pathogens
fungi
hieronymus
humanitarian
lyme disease
photograph
standard scalar program
viruses
chakras
divine
divine light
hepatitis
testimonials
chronic fatigue
chronic fatigue syndrome
dental health
epsteinbarr
fungus
psoriasis
autoimmune
cancer
chakra balance
common cold
diabetes
epsteinbarr virus
gingivitis
natural foods
ngos
nutrient program
phoenix voyage
scalar energy
shingles
testimonial
addiction
alzheimers
alzheimers disease
chakra balancing
depression
energetic signature
female hormone program
hormone therapy
hormones
msra
multiple sclerosis
neurological conditions
nikola tesla
parasites
protozoan
scalar light technology
scalar technology
shingles virus
amino acid and protein therapy
amino acids
amoebiasis
angels
antimicrobial resistance
apollo 11
ark of the covenant
atherosclerotic plaque
autism
bonds
borrelia burgdorferi
candida
candida auris
cardiovascular
cataracts
catholic
cellulitis
chemical detox
conventional medicine
crohns disease
dementia
dental caries
earthquakes
electromagnetic energy
entamoeba histolytica
enzymes
epilepsy
essential amino acids
estradiol
fat metabolism
fibromyalgia
fungal infection
gall stones
gastrointestinal
gum disease
high blood pressure
high blood sugar
hormonal imbalance
imelda lambertini
incorruptibility
influenza
jesus
kidney stones
kozyrev
leaky gut
leukemia
light
limbic kindling
liquefaction
lymphocytic leukemia
lymphotropic virus
malaria
mary of agreda
mold
morgellons
nail fungus
nanobacteria
natural healing
non gmo
nonessential amino acids
nutrients
nutrition
obesity
oral hygiene
pablo maria
papillomavirus
parkinsons
parkinsons disease
patent
periodontitis
photosynthesis
pneumonia
prions
probiotic bacteria
prophecies
proteins
radiant energy
respiratory syncytial virus
rheumatoid arthritis
sarah hieronymus
scalar light instruments
schedule
scientists
scleroderma
sclerosis
spiral
spiritual
spirochetal disease
st john vianney
streptococcus
tanzania
tetanus
thomas henry moray
thyroid
ticks
tuberculosis
urinary tract infection
video
virus

Quantum Cryptography

The word Cryptography is a word made up from greek etymology: “Kryptos” means hidden, and “graphia”, which means writing. Cryptography is a technique created to deal with the protection of confidential information from unauthorized observers. This means, only an observer with the knowledge to solve the code could get the information.

Through cryptography, information can be protected against unauthorized access, interception, modification, and the insertion of extra information. It can also be applied to prevent unauthorized access and use of the resources of a network or computer system and to avoid users from denying the services to which they are allowed. Modern cryptography includes all the methodologies to provide the security of telematic networks, including the identification, authentication, control of resources, and the privacy and integrity of confidential messages.

History

 The beginnings of cryptography go centuries ago. Until recent decades, it has been the history of classical cryptography – encryption methods that use pencil and paper, or perhaps simple mechanical aid. At the beginning of the 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, allowed the creation of more sophisticated and efficient encryption methods; and the subsequent introduction of electronics and computing has allowed elaborate systems that remain highly complex.

picture of quantum computing concept with green light surrounding

Quantum Mechanics in Cryptography

Quantum cryptography is cryptography that uses principles of quantum mechanics to guarantee the absolute confidentiality of transmitted information. Quantum cryptography as an idea was proposed in 1970, but it was not until 1984 that the first protocol was published. One of the most crucial properties of quantum cryptography is that if a third party attempts to spy during the creation of the secret key, the process is disrupted, with the intruder being warned before private information is transmitted.  The security of quantum cryptography rests on the foundations of quantum mechanics, unlike traditional public-key cryptography, which rests on assumptions of the unproven computational complexity of certain mathematical functions.

Quantum cryptography uses photons to transmit a key. Once the key is transmitted, it can be encrypted and unencrypted using the normal secret key method. To convert photons into a key, binary code is used. Each type of photon spin represents information, usually a 1 or 0, for a binary code. This code uses ones and zeros to create a consistent message. An example is the word “h-e-l-l-o” which could correspond to a set of numbers in binary code, let’s say 01101000. Therefore, a binary code can be assigned to each photon, depending on the spin of the current photon. The secret is in applying quantum principles in modern cryptography. This is the basis of the technique known as Quantum Key Distribution (QKD). QKD is not only a solution to computer security problems. It can also secure data exchange. We can make the same sequence of random numbers appear simultaneously in two separate places, without going through the middle. It’s like it’s magic, but it’s something quantum physics predicts.

Quantum Computing shown using zeros and ones in a blue and green light

Quantum Cryptography Challenges

In practice, quantum cryptography has its weakness. It has been recognized, for example, that a hacker could blind a detector with a strong pulse, preventing it from seeing the photons that held the secret. Photons are typically generated by a laser at such a low intensity that it produces only one photon at a time. And there is always a small probability that the laser could emit a photon encoded with confidential information and then a second photon with the information repeated. In this case, all the enemy has to do is steal the second photon, and they will have access to the data without us knowing.

Alternatively, it can be tricky to tell when a single photon arrives. The detectors may not register that a particle has hit them, leading us to think that the system has been hacked when it is actually quite safe. If we had better control over quantum systems than we have with today’s technology, perhaps quantum cryptography could be less susceptible to problems. No system is 100% perfect, and even the most advanced technology always deviates from theory in some way. A smart hacker always finds a way to exploit security breaches.

Any encoding method can only be as secure as the humans who make it work. Today no one knows exactly when there will be a quantum computer with sufficient capacity (design and qubits) to override procedures that facilitate security mechanisms in communications and digital networks, typically through the use of cryptography.  The date range is very loose from a few years, for the very optimists, to several decades. It is very clear that it will be difficult for us to have these computers at a particular level in the coming decades, which is a matter that will be restricted to large countries with the economic and scientific capacity to carry this complex project forward.