Don't wanna be here? Send us removal request.
Text
The Evolution of Quantum Internet Protocols
Researchers across the US, China and Europe are working hard to bring about a quantum internet. This globe-spanning network would carry information encrypted with quantum keys that are virtually impossible to intercept, even by an attacker with access to the key. It’s an ambitious goal that could revolutionize everything from the security of online banking to military communications and satellite tracking.
Unlike conventional computer bits, which convey information as either a 0 or a 1, qubits (in this case electrons) can encode a huge amount of information using unique conditions found only on the subatomic scale, like their intrinsic angular momentum (like a tiny compass needle that points up or down). These are called superposition and no-cloning, and they allow scientists to use a combination of these states to transmit quantum data between endpoints in a network.

The most important step in creating a quantum network is to link up the qubits that will form its backbone. This is a major engineering challenge because the quantum channels will have to share existing fibre-optic cables. To do so without compromising the integrity of the data, scientists are trying to build teleportation networks that can reliably exchange entangled photons between distant locations. They must also figure out how to churn out lots of linked photons on demand and keep them techogle.co entangled over very long distances.
Scientists have made good progress toward these goals, but there’s still a long way to go before the first quantum internet prototype is ready for testing. Most of these projects involve connecting a lab-based quantum node to distant sites over “dark fibers” – installed but unused telecommunication fibre-optic cable that can be used for experimental purposes. Once these connections have been made, the nodes must be able to communicate with one another by sending a series of photon pulses that are interspersed with stronger but decoy photons. These false pulses are designed to spoof any attempt to intercept the true key pulses.
This so-called quantum amplification is vital to making the system work at all. In the best-case scenario, a single entangled photon can be transmitted from one node to another without being degraded by any interference (as long as there are no quantum anomalies in the transmission path). In more realistic cases, a single entangled photon might need to be re-encrypted before being transmitted to a new location.
But even if such quantum amplification works, the full benefits of a quantum internet won’t be realized until the network reaches the second stage – prepare and measure networks. In these, end-to-end transmission of entangled technology website photons can be accomplished using the aforementioned quantum repeaters. This would enable quantum key distribution and other functions with no counterpart in the classical Internet, such as secure login and quantum cryptography. The third stage, memory networks, will require nodes to store a qubit’s quantum state for a specific length of time. At this point, teleportation, blind quantum computation and other tasks will be possible.
1 note
·
View note