{"id":206602,"date":"2017-02-09T17:34:30","date_gmt":"2017-02-09T22:34:30","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com.php"},"modified":"2017-02-09T17:34:30","modified_gmt":"2017-02-09T22:34:30","slug":"quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloning\/quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com.php","title":{"rendered":"Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking &#8211; Photonics.com"},"content":{"rendered":"<p><p>Photonics.com  Feb 2017 OTTAWA, Ontario, Feb. 7, 2017  Universal optimal  quantum cloning of high-dimensional photonic  states has been achieved using the symmetrization method. The  work has led to the discovery of information that could help  system administrators protect quantum computing networks from  external attacks.  <\/p>\n<p>    Researchers at the University of Ottawa demonstrated the    feasibility of high-dimensional optimal cloning of orbital    angular momentum (OAM) states of single photons and used their    discovery to perform a cloning attack to a secure quantum    channel. The team cloned the qubits of a secure quantum message    as well as the no-cloning theorem allowed  meaning that the    teams clones were almost exact replicas of the original    information. The no-cloning theorem, a fundamental law of    quantum physics, prohibits perfect copies and is the backbone    of security for quantum communications.  <\/p>\n<p>    The team showed the universality of their technique by cloning    several arbitrary input states and characterized the cloning    machine by performing quantum state tomography on cloned    photons. They experimentally demonstrated a cloning attack on a    Bennett and Brassard (BB84) quantum key distribution protocol    to show the robustness of high-dimensional states in quantum    cryptography.  <\/p>\n<p>    But in addition to undermining what was previously thought to    be a perfect way of securely transmitting information, the    researchers analyses revealed promising clues about how to    protect against such hacking.  <\/p>\n<p>    \"Our team has built the first high-dimensional quantum cloning    machine capable of performing quantum hacking to intercept a    secure quantum message,\" said professor Ebrahim Karimi. \"Once    we were able to analyze the results, we discovered some very    important clues to help protect quantum computing networks    against potential hacking threats.\"  <\/p>\n<p>    The team hopes that their quantum hacking efforts could be used    to study quantum communication systems and how quantum    information travels across quantum computer networks.  <\/p>\n<p>    The open access article was published in Science    Advances (doi:    10.1126\/sciadv.1601915).   <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.photonics.com\/Article.aspx?AID=61667\" title=\"Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking - Photonics.com\">Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking - Photonics.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Photonics.com Feb 2017 OTTAWA, Ontario, Feb. 7, 2017 Universal optimal quantum cloning of high-dimensional photonic states has been achieved using the symmetrization method.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloning\/quantum-cloning-machine-reveals-clues-that-could-protect-against-hacking-photonics-com.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[431597],"tags":[],"class_list":["post-206602","post","type-post","status-publish","format-standard","hentry","category-cloning"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/206602"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=206602"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/206602\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=206602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=206602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=206602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}