{"id":6092,"date":"2017-06-24T14:56:16","date_gmt":"2017-06-24T14:56:16","guid":{"rendered":"https:\/\/igotoffer.com\/blog\/?p=6092"},"modified":"2019-01-30T17:25:05","modified_gmt":"2019-01-30T17:25:05","slug":"quantum-networks-for-all","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all","title":{"rendered":"Quantum Networks: What are they, how they can be used"},"content":{"rendered":"<h2><strong>Quantum Networks: What are they, how they can be used<\/strong><\/h2>\n<p>The recent outbreak of&nbsp;<a href=\"https:\/\/igotoffer.com\/blog\/protect-data-wannacry\" target=\"_blank\" rel=\"noopener\">WannaCry ransom<\/a> malware&nbsp;created a lot of issues. The most crucial being that of the industrial and government network\u2019s vulnerability. Cyber security experts and authorities have long been seeking a hack-proof network. The Israeli Ministry of Defense sponsored the first ever quantum network to be designed and built by a university in Jerusalem.<\/p>\n<p>So, what is a quantum, and what advantages will it hold over fiber-optic and wireless networks?<\/p>\n<p>A quantum is the smallest particle of matter, which is undividable. In our case, a particle of light called a photon. A quantum possesses many amazing features that seem illogical from the first glance. For instance, it changes its qualities when looked upon. If our chairs were like a quantum, they\u2019d turn into kangaroos a dozen times a day. In terms of data transfer, intercepting a quantum-ciphered piece of data changes it, and the receiver will understand the data that was intercepted. However, the hacker won\u2019t be able to use the intercepted cipher key or password because it is changed. This is a bit like stealing the fairy gold that turns into shards and coals in daylight.<\/p>\n<p>To send data in quanta, scientists use a special laser that emits short impulses. Let\u2019s say we have a sender named Alice and a receiver named Bob. Physicists love romance, too, afterall. But, there\u2019s also Eve who is jealous of Bob and Alice, and wants to ruin their relationship. For instance, Alice writes to Bob, \u201cLet\u2019s have dinner in our favorite place, the seafood restaurant.\u201d Eve intercepts the message and reads it. However, she doesn\u2019t know that changing the route and reading the message ruins it. All she can get is a mess of letters like \u201cfjowsdfyl;ksdf\u2019an\u201d.<\/p>\n<div id=\"attachment_6093\" style=\"width: 479px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-6093\" loading=\"lazy\" class=\"wp-image-6093 size-full\" title=\"quantum networks\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg\" alt=\"quantum networks\" width=\"469\" height=\"336\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg 469w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer-300x215.jpg 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer-209x150.jpg 209w\" sizes=\"(max-width: 469px) 100vw, 469px\" \/><p id=\"caption-attachment-6093\" class=\"wp-caption-text\">Image: habrastorage.org\/files\/718\/794\/d40\/718794d4069f42a3af747854b118f82b.jpg<\/p><\/div>\n<p>Bob would be puzzled to get such a cryptic message from his girlfriend, but he can call her back and ask for details. Eve will know nothing about the plans.<\/p>\n<p>\u201cI can\u2019t quite grasp the idea\u201d, I hear you saying, \u201cIsn\u2019t Bob an observer as well? If reading the message ruins it, how can he get any at all? It\u2019s rubbish!\u201d And now we approach another amazing quality of photons \u2013 entanglement. Alice and Bob are entangled with each other, and that\u2019s why they can read the messages they send to each other. Because, in the quantum world, there\u2019s no sending or receiving. The moment one entangled quantum changes, the other copies it. Data in the quantum world is ubiquitous.<\/p>\n<p>How so? You have all probably read a story about twins separated at birth that grew up without knowing of each other. How they broke the same arm as kids, grew up and got married on the same day to namesakes, and how they have the same number of kids and gave them the same names. Quanta are these twins. Knowing what happened to one of them, we know for sure what the other experienced. By changing one of them, we change the other in the same way.<\/p>\n<p>What\u2019s more amazing is that the entangled quanta do not need to physically contact each other to experience the changes. This phenomenon is called quantum teleportation. It teleports not physical objects, (no&nbsp;Star Trek&nbsp;gadgets here) but data, features, and qualities. Let\u2019s take a pair of socks. The moment you put one sock on your right foot, the other becomes a left sock. You didn\u2019t touch it, you didn\u2019t take it from the box, all you did is put on one sock from the pair. In doing this, you changed the other one.<\/p>\n<p>How did the particles get entangled? The twins were born from the same parents, the socks came in a box and were picked up for today\u2019s tennis match. The particles should collide to get entangled.<\/p>\n<p>This is the victory! Hackers of the world are defeated forever! Or are they? Not quite, we\u2019re sorry to say. For example, a quantum message cannot be forwarded. Forwarding means changing the route, and this ruins the message altogether. Alice, too, cannot write to anyone but Bob. Poor Alice!<\/p>\n<p>The Los Alamos lab scientists have suggested the network model that features the central hub. Every message goes first to this hub, and then to other destinations. Alice can write to Charlie, Dolly, and Frank. But, here is where the other issue emerges.<\/p>\n<p>The issue, namely, is the photons nature. As they travel along the fiber-optic cable they are vanishing; they\u2019re dissolving into the environment. The maximum distance for quantum internet is 150 km. So, Bob really has to live next door to Alice. The record distance in the experiment of 2015, conducted by American and Japanese universities, is 144 km. No photon lives beyond this limit.<\/p>\n<p>The short life of the particles determines the data properties. Photons can transfer codes and keys, but not a large amount of data like this article or a picture, to say nothing of 4k video. Alice can\u2019t share her Instagram with Bob, for instance.<\/p>\n<p>Nowadays there are two ways to overcome the barrier. One is to install amplifiers every 100 km, and the other is to cool down the cables by using rare materials like molybdenum. Suffice it to say that making the cables from gold and diamonds would be cheaper. So, quantum internet can be used within a lab, military headquarters, or for a banking network, provided that it covers a compact area.<\/p>\n<p>Right now, transferring codes, keys, and sensitive banking data is the only way quantum networks are used. There are companies like Id Quantique,&nbsp;MagiQ, and&nbsp;Smart Quantum which provide the industry class solutions.<\/p>\n<p>Still, there\u2019s a long way to go before our hospitals can afford the quantum network and storage. Speaking of which, read about quantum computers next! Stay tuned!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum Networks: What are they, how they can be used The recent outbreak of&nbsp;WannaCry ransom malware&nbsp;created a lot of issues. The most crucial being that of the industrial and government network\u2019s vulnerability. Cyber security experts and authorities have long been seeking a hack-proof network. The Israeli Ministry of Defense sponsored the first ever quantum network [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6093,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[433,460,481],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quantum Networks: What are they, how they can be used | iGotOffer<\/title>\n<meta name=\"description\" content=\"The outbreak of WannaCry ransom malware brought up a lot of issues about networks vulnerability. One possible solution for the future - quantum networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Networks: What are they, how they can be used | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"The outbreak of WannaCry ransom malware brought up a lot of issues about networks vulnerability. One possible solution for the future - quantum networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all\" \/>\n<meta property=\"og:site_name\" content=\"iGotOffer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iGotOffer\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/svetlana.ustinova2\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-24T14:56:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-30T17:25:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"469\" \/>\n\t<meta property=\"og:image:height\" content=\"336\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\",\"url\":\"https:\/\/igotoffer.com\/blog\/\",\"name\":\"iGotOffer Blog\",\"description\":\"News and reviews about electronics &amp; apps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg\",\"contentUrl\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg\",\"width\":469,\"height\":336,\"caption\":\"Image: https:\/\/habrastorage.org\/files\/718\/794\/d40\/718794d4069f42a3af747854b118f82b.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#webpage\",\"url\":\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all\",\"name\":\"Quantum Networks: What are they, how they can be used | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#primaryimage\"},\"datePublished\":\"2017-06-24T14:56:16+00:00\",\"dateModified\":\"2019-01-30T17:25:05+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\"},\"description\":\"The outbreak of WannaCry ransom malware brought up a lot of issues about networks vulnerability. One possible solution for the future - quantum networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum Networks: What are they, how they can be used\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\",\"name\":\"Steve\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"caption\":\"Steve\"},\"sameAs\":[\"https:\/\/igotoffer.com\/\",\"https:\/\/www.facebook.com\/svetlana.ustinova2\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Networks: What are they, how they can be used | iGotOffer","description":"The outbreak of WannaCry ransom malware brought up a lot of issues about networks vulnerability. One possible solution for the future - quantum networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all","og_locale":"en_US","og_type":"article","og_title":"Quantum Networks: What are they, how they can be used | iGotOffer","og_description":"The outbreak of WannaCry ransom malware brought up a lot of issues about networks vulnerability. One possible solution for the future - quantum networks.","og_url":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all","og_site_name":"iGotOffer Blog","article_publisher":"https:\/\/www.facebook.com\/iGotOffer","article_author":"https:\/\/www.facebook.com\/svetlana.ustinova2","article_published_time":"2017-06-24T14:56:16+00:00","article_modified_time":"2019-01-30T17:25:05+00:00","og_image":[{"width":469,"height":336,"url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"Steve","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/blog\/#website","url":"https:\/\/igotoffer.com\/blog\/","name":"iGotOffer Blog","description":"News and reviews about electronics &amp; apps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#primaryimage","url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg","contentUrl":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/06\/quantium_computer.jpg","width":469,"height":336,"caption":"Image: https:\/\/habrastorage.org\/files\/718\/794\/d40\/718794d4069f42a3af747854b118f82b.jpg"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#webpage","url":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all","name":"Quantum Networks: What are they, how they can be used | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#primaryimage"},"datePublished":"2017-06-24T14:56:16+00:00","dateModified":"2019-01-30T17:25:05+00:00","author":{"@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16"},"description":"The outbreak of WannaCry ransom malware brought up a lot of issues about networks vulnerability. One possible solution for the future - quantum networks.","breadcrumb":{"@id":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/blog\/quantum-networks-for-all"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/blog\/quantum-networks-for-all#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Quantum Networks: What are they, how they can be used"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16","name":"Steve","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","caption":"Steve"},"sameAs":["https:\/\/igotoffer.com\/","https:\/\/www.facebook.com\/svetlana.ustinova2"]}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/6092"}],"collection":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/comments?post=6092"}],"version-history":[{"count":0,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/6092\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media\/6093"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media?parent=6092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/categories?post=6092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/tags?post=6092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}