Quantum Cryptography sophistication of the system that was successfully broken into

One method of computing the encryption system is a sophisticated network security and secure during this dianqqap palinq quantum cryptographic system that was able to penetrate even the action of hackers who attack the character: "invisible attack" so that the action of piercing can walk quietly slipped undetected.
Quantum cryptography is considered the method works perfectly with a system that relies on the basic principle that this system can not be penetrated at all without first cause interference with the integrity of the whole system to normal ongoing. In theory, when the hackers trying to penetrate to interception or "eavesdropping" to sniff out the quantum encryption code data being transmitted in the network, it will always happen disturbances on the system until the system can immediately trigger an alarm signal about the occurrence of interference detection.


In a publication published in recent scientific journals "Nature Photonics" Vadim Makarov et al. Researchers from the University of Science and Technology in Trondheim - Norway presents experimental hacking action which he believes 100% up to successfully break into systems digondolnya passcode lock security: encryption code and found that it runs with piercing action at all without the slightest sign will cause the disturbances on the system quantum cryptographic executed. In practice Makarov et al didemontrasikan action in breaking the quantum cryptographic network security systems are available commercially and the Swiss-made IDquantique MAGIQ from Massachusetts.
Quantum cryptographic systems work by generating a series of secret key code with a specific value of encoder process binary system 1 --- --- 0 or by piggybacking on the characteristics of photon quantum status differences that are part of a pinch of light particles.
Action piercing hacking findings shined Makarov et al carried out with a pinch of one milliwatt laser beam to make it able to outwit detection system that functions to maintain the integrity of the integrity of the entire system to be manipulated without being able to detect the disruption of ongoing security encryption system bugged.
Makarov said in explanation of how the team finally breaker hacker group basically works by exploiting a security weakness gap: "security loophole" in such a way as to change the system of quantum cryptography as a sophisticated security system to be like a classical model that is more easily penetrated, and engineering of this happens without realized by any party as the guard maker sediakalanya encryption security system is very sophisticated.
Share on Google Plus

About Fikri

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
    Blogger Comment
    Facebook Comment

0 komentar:

Posting Komentar

Sundul gan! Ane ga kenal yang namanya spam...