Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Computer Hackers R.I.P.: Making Quantum Cryptography Practical






ScienceDaily (May 2, 2009) — Quantum cryptography, a completely secure means of communication, is much closer to being used practically as researchers from Toshiba and Cambridge University's Cavendish Laboratory have now developed high speed detectors capable of receiving information with much higher key rates, thereby able to receive more information faster.

New research details how quantum communication can be made possible without having to use cryogenic cooling and/or complicated optical setups, making it much more likely to become commercially viable soon.

One of the first practical applications to emerge from advances in the often baffling study of quantum mechanics, quantum cryptography has become the soon-to-be-reached gold standard in secure communications.

Quantum mechanics describes the fundamental nature of matter at the atomic level and offers very intriguing, often counter-intuitive, explanations to help us understand the building blocks that construct the world around us. Quantum cryptography uses the quantum mechanical behaviour of photons, the fundamental particles of light, to enable highly secure transmission of data beyond that achievable by classical encryption.

The photons themselves are used to distribute keys that enable access to encrypted information, such as a confidential video file that, say, a bank wishes to keep completely confidential, which can be sent along practical communication lines, made of fibre optics. Quantum indeterminacy, the quantum mechanics dictum which states that measuring an unknown quantum state will change it, means that the key information cannot be accessed by a third party without corrupting it beyond recovery and therefore making the act of hacking futile.

While other detector s can offer a key rate close to that reported in this journal paper, the present advance only relies on practical components for high speed photon detection, which has previously required either cryogenic cooling or highly technical optical setups, to make quantum key distribution much more user-friendly.

Using an attenuated (weakened) laser as a light source and a compact detector (semiconductor avalanche photodiodes), the researchers have introduced a decoy protocol for guarding against intruder attacks that would confuse with erroneous information all but the sophisticated, compact detector developed by the researchers.

As the researchers write, " With the present advances, we believe quantum key distribution is now practical for realising high band-width information-theoretically secure communication."

Governments, banks and large businesses who fear the leaking of sensitive information will, no doubt, be watching closely.

(based on: https://www.sciencedaily.com)

14. Find English equivalents in the text:

Ключова швидкість, практично здійсненний, незбагненне вивчення, нелогічний, шифрувальна справа, досяжний, волоконна оптика, криогенне охолодження, розповсюджувати ключі, зашифрована інформація, невизначеність, вислів, без можливості відновлення, хакерство, марний, прилад для виявлення, ослаблений лазер, напівпровідникові лавинні фотодіоди, приманка протоколу, витік конфіденційної інформації.

 

15. What words from the text are defined? Choose them from the databank:

Databank: cryogenic, a detector, a setup, encryption, erroneous, quantum mechanics, fibre optics, the leaking of sensitive information, distribution, a protocol.

1) any device that receives a signal or stimulus (as heat or pressure or light or motion etc.) and responds to it in a distinctive manner; 2) of or relating to low temperatures; 3) quantum theory, especially the quantum theory of the structure and behavior of atoms and molecules; 4) the procedures and methods of making and using secret languages, as codes or ciphers; 5) the transmission of information modulated on light carried down very thin flexible fibres of glass; 6) problems of privacy when confidential information is lost or intercepted, lawfully or otherwise; 7) the way something is organized or arranged; 8) a standard procedure for regulating data transmission between computers; 9) containing or derived from error; mistaken; 10) the act of distributing or spreading or apportioning.

 

16. Make up word combinations:

1. to emerge a) against intruder attacks
2. the fundamental nature b) of hacking futile
3. gold standard c) transmission of data
4. to enable highly secure d) with erroneous information
5. to be achievable e) of matter
6. to make the act f) on practical components
7. to offer g) from advances
8. to guard h) by classical encryption
9. to rely i) in secure communications
10. to confuse j) a key rate

 

17. Insert the words in bold type into appropriate places:






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.