×

Science and myths's video: Quantum Physics Quantum Cryptography Quantum Key Distribution

@Quantum Physics का ऐसा ताला जिसको कोई नहीं खोल सकता Quantum Cryptography | Quantum Key Distribution
Open your Demat Account with Motilal Oswal - Link https://www.motilaloswal.com/campaign/Registrationoffers/Page242/SEM_Campaign135.html?utm_source=scienceandmyths&utm_medium=topinfluencers&utm_term=may21 https://play.google.com/store/apps/details?id=com.mosl.mobile https://apps.apple.com/in/app/mo-investor/id1055577451 Quantum cryptography sounds fairly complex – probably because it is. That’s why we put together this “encryption guide for dummies” as a way of explaining what quantum cryptography is and taking some of the complexity out of it. Although the subject has been around for a couple of decades, quantum cryptography (not to be confused with post-quantum cryptography) is quickly becoming more critically relevant to our everyday lives because of how it can safeguard vital data in a way that current encryption methods can’t. Consider, for example, the trust you place in banks and commercial enterprises to keep your credit card and other information safe while conducting business transactions online. What if those companies – using current encryption methods – could no longer guarantee the security of your private information? Granted, cybercriminals are always trying to gain access to secure data, but when quantum computers come online, that information will be even more vulnerable to being hacked. In fact, hackers don’t even need to wait for quantum computers to start the process because they’re collecting encrypted data now to decrypt later when the quantum computers are ready. With quantum encryption, that’s not the case because your information will be unhackable. Let’s explain. Cryptography is the process of encrypting data, or converting plain text into scrambled text so that only someone who has the right “key” can read it. Quantum cryptography, by extension, simply uses the principles of quantum mechanics to encrypt data and transmit it in a way that cannot be hacked. While the definition sounds simple, the complexity lies in the principles of quantum mechanics behind quantum cryptography, such as: The particles that make up the universe are inherently uncertain and can simultaneously exist in more than one place or more than one state of being. Photons are generated randomly in one of two quantum states. You can’t measure a quantum property without changing or disturbing it. You can clone some quantum properties of a particle, but not the whole particle. All these principles play a role in how quantum cryptography works. Quantum cryptography, or quantum key distribution (QKD), uses a series of photons (light particles) to transmit data from one location to another over a fiber optic cable. By comparing measurements of the properties of a fraction of these photons, the two endpoints can determine what the key is and if it is safe to use. Breaking the process down further helps to explain it better. The sender transmits photons through a filter (or polarizer) which randomly gives them one of four possible polarizations and bit designations: Vertical (One bit), Horizontal (Zero bit), 45 degree right (One bit), or 45 degree left (Zero bit). The photons travel to a receiver, which uses two beam splitters (horizontal/vertical and diagonal) to “read” the polarization of each photon. The receiver does not know which beam splitter to use for each photon and has to guess which one to use. Once the stream of photons has been sent, the receiver tells the sender which beam splitter was used for each of the photons in the sequence they were sent, and the sender compares that information with the sequence of polarizers used to send the key. The photons that were read using the wrong beam splitter are discarded, and the resulting sequence of bits becomes the key. If the photon is read or copied in any way by an eavesdropper, the photon’s state will change. The change will be detected by the endpoints. In other words, this means you cannot read the photon and forward it on or make a copy of it without being detected. To know more watch out this full video. Thanks for watching.. Social accounts link https://www.instagram.com/scienceandmyths/ Facebook Page- https://www.facebook.com/ScienceAndMyths/ FAIR-USE COPYRIGHT DISCLAIMER This video is meant for Educational/Inspirational purpose only. We do not own any copyrights, all the rights go to their respective owners. The sole purpose of this video is to inspire, empower and educate the viewers. https://play.google.com/store/apps/details?id=com.mosl.mobile https://apps.apple.com/in/app/mo-investor/id1055577451

5.4K

536
Science and myths
Subscribers
515K
Total Post
304
Total Views
7.2M
Avg. Views
73.1K
View Profile
This video was published on 2021-05-15 10:58:40 GMT by @Science-and-myths on Youtube. Science and myths has total 515K subscribers on Youtube and has a total of 304 video.This video has received 5.4K Likes which are higher than the average likes that Science and myths gets . @Science-and-myths receives an average views of 73.1K per video on Youtube.This video has received 536 comments which are higher than the average comments that Science and myths gets . Overall the views for this video was lower than the average for the profile.

Other post by @Science and myths