{"id":34066,"date":"2017-02-02T22:24:53","date_gmt":"2017-02-03T06:24:53","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2017\/02\/quantum-encryption-just-took-one-more-step-toward-beating-hackers"},"modified":"2017-06-04T13:48:01","modified_gmt":"2017-06-04T20:48:01","slug":"quantum-encryption-just-took-one-more-step-toward-beating-hackers","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2017\/02\/quantum-encryption-just-took-one-more-step-toward-beating-hackers","title":{"rendered":"Quantum Encryption Just Took One More Step Toward Beating Hackers"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/quantum-encryption-just-took-one-more-step-toward-beating-hackers.jpg\"><\/a><\/p>\n<p>Nice read on QC cryptography.<\/p>\n<hr>\n<p>Between Russian hackers and insecure email servers, this past election has proved that cyber security is going to be extremely important moving forward. But with the advent <a href=\"http:\/\/www.iflscience.com\/technology\/researchers-reveal-blueprint-for-quantum-computers\/\">of quantum computers<\/a>, it\u2019s only going to become harder to keep data safe from those with the motive and the right tools. Fortunately, scientists believe they may have found a solution within the same principles that guide quantum computing: <a href=\"https:\/\/www.wired.com\/2017\/02\/physicists-test-quantum-cryptography-playing-catch-photons-plane\/\">quantum encryption<\/a>.<\/p>\n<p>To fully understand the scope of what quantum computers can do, it\u2019s important to realize that it might take current, non-quantum computers <em>longer than the total age of the universe<\/em> to crack certain encryptions. But, as grad student Chris Pugh explained in a recent interview with <a href=\"https:\/\/www.wired.com\/2017\/02\/physicists-test-quantum-cryptography-playing-catch-photons-plane\/\" target=\"_blank\">Wired<\/a>, quantum computers might be able to crack the same codes in \u201ca matter of hours or days\u201d.<\/p>\n<p>The magic of quantum encryption is that, despite being based on similar principles, quantum computers can\u2019t interfere with it\u2014i <a href=\"http:\/\/www.popsci.com\/what-is-quantum-cryptography\" target=\"_blank\">n theory, <em>nothing<\/em> can<\/a>. Using quantum entanglement (what Einstein called \u2018spooky action at a distance\u2019), methods like quantum key distribution can encode data in particles sort of like Morse code or a binary bit, then send them. These particles are \u2018entangled,\u2019 which means each one has been paired with a double, which resides in the hands of the sender. This is where the magic happens, according to PopSci:<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.outerplaces.com\/science\/item\/14241-quantum-encryption-computers-hackers-pugh\">http:\/\/www.outerplaces.com\/science\/item\/14241-quantum-encryp...ckers-pugh<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nice read on QC cryptography. Between Russian hackers and insecure email servers, this past election has proved that cyber security is going to be extremely important moving forward. But with the advent of quantum computers, it\u2019s only going to become harder to keep data safe from those with the motive and the right tools. Fortunately, [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1625,1617],"tags":[],"class_list":["post-34066","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-encryption","category-quantum-physics"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/34066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=34066"}],"version-history":[{"count":3,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/34066\/revisions"}],"predecessor-version":[{"id":65217,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/34066\/revisions\/65217"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=34066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=34066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=34066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}