{"id":176031,"date":"2017-02-07T22:25:54","date_gmt":"2017-02-08T03:25:54","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/boffins-create-quantum-cloning-machine-to-intercept-secure-the-inquirer\/"},"modified":"2017-02-07T22:25:54","modified_gmt":"2017-02-08T03:25:54","slug":"boffins-create-quantum-cloning-machine-to-intercept-secure-the-inquirer","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/boffins-create-quantum-cloning-machine-to-intercept-secure-the-inquirer\/","title":{"rendered":"Boffins create quantum cloning machine to intercept &#8216;secure &#8230; &#8211; The INQUIRER"},"content":{"rendered":"<p><p>    BOFFINS AT THE University of Ottawa claim that    quantum computing may not provide the virtually 'unbreakable'    security that it has been claimed the technology could    offer.  <\/p>\n<p>    Physicists at the University claim that they were able to build    a \"quantum cloning machine\" that was able to intercept a    \"secure quantum message\".  <\/p>\n<p>    Their research suggests that initiatives such as     China's dedicated quantum encryption network, which will    supposedly provide secure communications between Beijing,    Shanghai and a number of cities in between when it is finished    at the end of the year, might not provide the security that its    designers had planned.  <\/p>\n<p>    \"Our team has built the first high-dimensional quantum cloning    machine capable of performing quantum hacking to intercept a    secure quantum message,\" said University of    Ottawa Department of Physics professor Ebrahim    Karimi.  <\/p>\n<p>    \"Once we were able to analyse the results, we discovered some    very important clues to help protect quantum computing networks    against potential hacking threats.\"  <\/p>\n<p>    Quantum systems were believed to provide secure data    transmission because, until now, attempts to copy the    transmitted information resulted in an altered or deteriorated    version of the original information, thereby defeating the    purpose of the initial hack.  <\/p>\n<p>    In conventional computing, anyone can simply copy-and-paste    information and replicate it exactly. But this doesn't hold    true in the quantum computing world, where attempts to copy    quantum information - or qudits* - result in what Karimi refers    to as \"bad\" copies.  <\/p>\n<p>    Professor Karimi's team was able to clone the photons that    transmit information, namely the single carriers of light known    as qubits, as well as quantum theory allows, meaning that the    clones were almost exact replicas of the original    information.  <\/p>\n<p>    At the same time, though, the researchers' analyses also    revealed some clues as to how to protect against such    hacking.  <\/p>\n<p>    \"What we found was that when larger amounts of quantum    information are encoded on a single photon, the copies will get    worse and hacking even simpler to detect,\" said Frdric    Bouchard, a University of Ottawa doctoral student.  <\/p>\n<p>    \"We were also able to show that cloning attacks introduce    specific, observable noises in a secure quantum communication    channel. Ensuring photons contain the largest amount of    information possible and monitoring these noises in a secure    channel should help strengthen quantum computing networks    against potential hacking threats.\"  <\/p>\n<p>    Interest in quantum computing has been escalating for years as    advances in conventional computing power slows down. Last week,    a     University of Surrey scientist published a blueprint for a    large-scale quantum computer, while     commercial developer D-Wave Systems has started to sell its    2000 qubit device to organisations that need to perform    particular calculations at speed.  <\/p>\n<p>    * The term \"qudit\" is used to denote    a unit of quantum information in a d-level quantum system.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.theinquirer.net\/inquirer\/news\/3004118\/boffins-create-quantum-cloning-machine-to-intercept-secure-messages\" title=\"Boffins create quantum cloning machine to intercept 'secure ... - The INQUIRER\">Boffins create quantum cloning machine to intercept 'secure ... - The INQUIRER<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> BOFFINS AT THE University of Ottawa claim that quantum computing may not provide the virtually 'unbreakable' security that it has been claimed the technology could offer. Physicists at the University claim that they were able to build a \"quantum cloning machine\" that was able to intercept a \"secure quantum message\".  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/boffins-create-quantum-cloning-machine-to-intercept-secure-the-inquirer\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187749],"tags":[],"class_list":["post-176031","post","type-post","status-publish","format-standard","hentry","category-cloning"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176031"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=176031"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176031\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=176031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=176031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=176031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}