Quantum networks: prospects and difficulties of implementation

 3r3193. 3r3-31. By estimated German researchers from The Max Planck Society , the global quantum network will be able to be implemented in the next few years. We will tell you what difficulties there are. 3r3167.  3r3193. 3r3167.  3r3193. 3r311. 3r3178.
3r3178. 3r3167.  3r3193.
3r3145. /Flickr / Mike Seyfang
/ CC 3r3182.
3r3167.  3r3193. 3r3167.  3r3193. 3r33112. What is quantum networks
3r3167.  3r3193. A quantum network is a data transmission system that operates according to the laws of quantum mechanics. In such networks, data is exchanged using qubits. These are polarized photons transmitted through the optical communication channel. In order to deploy global quantum networks covering the entire planet, like the Internet, developers and researchers have to solve a number of difficulties. For example, a certain complexity causes the transfer of photons over long distances due to their “fragility”. In more detail about this and other problems we will tell further, but first we will talk about why in general to create quantum networks. 3r3167.  3r3193. 3r3167.  3r3193. 3r33112. How they can be useful
3r3167.  3r3193. The phenomenon of quantum entanglement binds quantum particles in such a way that when measuring the characteristics of one of them, we automatically recognize the characteristics of the second. Moreover, this connection is maintained even at large distances. 3r3167.  3r3193. 3r3167.  3r3193. If you establish a connection between two points, you can generate sequences of random numbers at its two ends. In cryptography, this feature is used to generate encryption keys. 3r3167.  3r3193. 3r3167.  3r3193. Another advantage of quantum networks is the inability to read broadcast photons twice. The laws of quantum mechanics prohibit the "cloning" of the state of particles of light. At interception qubit, it changes its meaning. It turns out that when trying to "overhear" the data channel, the attackers will not be able to extract any valuable information. At the exit, they get a random set of numbers. 3r3167.  3r3193. 3r3167.  3r3193. Thus, quantum networks are almost absolute cryptographic protection. Almost absolute, as scholars from Sweden have proven that “eavesdropping” such a network is 3r355. still possible
. To do this, simulate a quantum cipher. Photon detectors ignore unpolarized particles of light, called zeros. If you simulate these zeros at a certain point in time and send them to the receiver, then it will consider the signal to be quantum (although this is not so). 3r3167.  3r3193. 3r3167.  3r3193. You can solve the problem, but you have to change the principles of the receivers. One of the options is to add a signal strength indicator (as it will change with external intervention). But this will lead to an increase in the cost of developing quantum networks. 3r3167.  3r3193. 3r3167.  3r3193. 3r33112. Why is it difficult
3r3167.  3r3193. The “fragility” of qubits, which makes quantum communication reliable, also brings disadvantages. Single photons change their states or are simply absorbed by the medium due to interference. For this reason, it can be difficult transmit the quantum via fiber optic cable 3r3178. at a distance of over 100 km. 3r3167.  3r3193. 3r3167.  3r3193. 3r375. 3r3167.  3r3193.
3r3145. /Flickr / Alexandre Delbos
/ CC 3r3182.
3r3167.  3r3193. 3r3167.  3r3193. Now fiber optic quantum networks are built using repeaters. They decode the information, encode it again and transmit to other nodes in a chain. However, in this way intermediaries also recognize the content of the message, which can lead to a leak if one of them is compromised. Here, there is a problem with the cost - such repeaters use expensive magnets and rare minerals . 3r3167.  3r3193. 3r3167.  3r3193. It is also important to consider the environment in which these networks will be deployed. There is a significant difference between laboratory and “combat” conditions. In the city, temperature changes affect fiber optic cables. This can lead to photon phase shifts and cause errors in data transmission. 3r3167.  3r3193. 3r3167.  3r3193. Quantum teleportation will solve the problem of transmission over long distances. Researchers can optionally introduce two qubits into a state of quantum entanglement. Such a project 3r3-300. engaged group 3r3178. from Delft University of Technology in the Netherlands. Researchers are building a ten-kilometer quantum network between the city of Delft and the Hague. 3r3167.  3r3193. 3r3167.  3r3193. Such technologies are still in the early stages of development. The fact is that it is difficult to maintain “connectedness” for a long time due to the destructive effect (called 3r?106. Decoherence of 3r3178.) That the external environment has on the quanta. It is possible to retain the state of quantum entanglement for a fraction of a second. 3r3167.  3r3193. 3r3167.  3r3193. 3r33112. Where it will be possible to use quantum networks
3r3167.  3r3193. As we have said, quantum networks are highly resistant to wiretapping. Therefore, they allow you to build reliable distribution systems of cryptographic keys. Such technologies already exist. For example, at the beginning of the year in China, 3r3r166. Launched a cryptographic key distribution system 3r3178. in which data is transmitted via satellites and laser beams. A similar system offered 3r3178. German researchers. 3r3167.  3r3193. 3r3167.  3r3193. Also quantum networks
network quantum computers. It is expected that clusters of quantum machines will speed up the implementation of physical and chemical simulations, for example, when developing new medical products. 3r3167.  3r3193. 3r3167.  3r3193. There are use cases outside of science, for example voting. This project was implemented in Switzerland - a few years ago CERN 3r3-33130. helped r3r3178. organize a quantum network for elections. According to experts from the Harvard-Smithsonian Center for Astrophysics, in addition to reliability, quantum networks make it possible to implement new strategic voting schemes that are not available today. For example, people will have the opportunity to choose not one candidate, but two at once (the second option). 3r3167.  3r3193. 3r3167.  3r3193. 3r3145. The development of quantum networks involved in many institutions and organizations. Therefore, more and more similar projects appear lately. About foreign and Russian developments in this area, we will tell in our following materials on Habré. 3r3182. 3r3167.  3r3193. 3r3167.  3r3193. 3r3142. 3r3167.  3r3193. 3r3145. P.S. What else do we write on the corporate blog VAS Experts:
 3r3193. 3r3167.  3r3193.
 3r3193. 3r3176. Implementing IPv6 - FAQ for ISPs 3r3179.  3r3193. 3r3176. 3r3158. IPv6 protocol - from theory to practice 3r3178. 3r3179.  3r3193. 3r3181. 3r3167.  3r3193. P.P.S. Several new articles from our blog on Habré:
 3r3193. 3r3167.  3r3193.
 3r3193. 3r3176. 3r3172. Wi-Fi 6 announced: what you need to know about the new standard 3r3178. 3r3179.  3r3193. 3r3176. 3r33177. Programmable valve arrays: how they will help networks 5G
3r3179.  3r3193. 3r3181. 3r3182. 3r3189. 3r3193. 3r3193. 3r3186. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e. ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () (); 3r3187. 3r3193. 3r3189. 3r3193. 3r3193. 3r3193. 3r3193.
+ 0 -

Add comment