Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Quantum Encryption: Some economic and national security implications
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > Quantum Encryption: Some economic and national security implications
Uncategorized

Quantum Encryption: Some economic and national security implications

BobGourley
BobGourley
4 Min Read
SHARE

One of the things I like about Alan Paller the individual and the organization he helps lead SANS is they encourage people to write.  They are great motivators, especially if you are pursuing a security certification.  As part of a my 2003 SANS certification I wrote a piece on Quantum Encryption and Quantum Computing and am glad I SANS forces me to put some thought into that.

More Read

Three Healthcare IT trends 2013
Three Healthcare IT Trends for 2013
The Future of Work: 3-D Learning
I’m No Google Fan Boy, But…
LinkedIn Faceted Search Now Out Of Beta
GDPR Fines, Ransomware, and Cybersecurity: What You Need To Know

I’m especially glad now that we are seeing increasing amounts of news and research announcements on the topics.  A key point I highlighted in the paper is the oft needed reminder that Quantum Encryption and Quantum Computing are two different things.  Both rely on Quantum effects but the impacts of their implementation will be different.  Quantum Encryption will enable encryption keys to be passed securely over a distance.  Quantum Computing will enable many things, but some dramatic security implications are expected.  For example, through implementation of the fast factorization of  integers via “Shor’s Algorithm,”  public key encryption using RSA encryption methods will be broken when Quantum Computing is available.

Now to my point:  I just read a great piece on Quantum Encryption written by Matthew Luce of the Jamestown Foundation.

The piece, titled China’s Secure Communications Quantum Leap, provides a solid review of recent announcements by a team of Chinese researchers from Tsinghua University in Beijing and the Hefei National Laboratory for Physical Sciences (a government directed research center).  Papers published by this team announce successful demonstrations of quantum teleportation, a requirement for quantum encryption.

Here is more from Matthew Luce:

Although much of the science behind this technology is still young, quantum technologies have wide-ranging applications for the fields of cryptography, remote sensing and secure satellite communications. In the near future, the results from this experiment will be used to send encrypted messages that cannot be cracked or intercepted, and securely connect networks, even in remote areas, with no wired infrastructure, even incorporating satellites and submarines into the link.

Rather than transporting matter from place to place, quantum teleportation’s most practical applications currently involve using photons for instantaneous, almost totally secure data communication. Using the term “teleportation” to describe this effect can be justified by what Albert Einstein called “spooky action at a distance”: after two particles are linked together through quantum entanglement, any change in the state of one particle immediately alters the other, even from miles away. In effect, the state of the particle at the sender’s end is destroyed and reappears as an exact replica at the receiver’s end, with a negligible chance of undetected third-party interception.

Does that have your interest?  Does that make you mind go on the national security and technology implications?

Check out Jamestown.org for more great writing on that and other topics.

 

TAGGED:security
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security
ai for making lyric videos
How AI Is Revolutionizing Lyric Video Creation
Artificial Intelligence Exclusive
intersection of data and patient care
How Healthcare Careers Are Expanding at the Intersection of Data and Patient Care
Big Data Exclusive
dedicated servers for ai businesses
5 Reasons AI-Driven Business Need Dedicated Servers
Artificial Intelligence Exclusive News

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

options for cybersecurity
Big DataExclusiveITSecurity

Machine Learning Makes VPNs Excellent Options For Cybersecurity

6 Min Read

Virtualization, one path to the mobile enterprise?

5 Min Read
Image
Uncategorized

How Machine Learning Is Improving Computer Security

6 Min Read

Extreme Redundancy – Don’t Leave Home Without It!

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?