What's new

China Quantum Communiations Technology: Cryptography, Radar, Satellite, Teleportation, Network

That's only a typical reply pattern from some members.

For the time being, it is impenetrable but as been proven in the history, new techniques will be invented to exploit those systems too.

As far back as 2007 quantum communications systems have been penetrated and compromised. Quantum communications and encryption work via the same principles; Quantum Wave Theory

Quantum hacking lab. Breaking quantum cryptography

Commercial Quantum Cryptography System Hacked

This white hat hacker cracks quantum encryption for fun and profit

Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not

Quantum Hackers Use Lasers to Crack Powerful Encryption Without Leaving a Trace

How quantum cryptography works: And by the way, it's breakable

Researchers show how to break quantum cryptography by faking quantum entanglement

Hackers blind quantum cryptographers

Quantum cryptography is hacked

Quantum communications and encryption have been penetrated, they are secure, but not unbreakable. China isn't the only nation working on these systems, and they aren't the only ones exploring the offensive and defensive capabilities for defeating and protecting quantum communications either.

Quantum communications are cool, but they aren't unbreakable. It's just another cog in an unending arms race.
 
Last edited:
.
As far back as 2010 quantum communications systems have been penetrated and compromised:

Quantum hacking lab. Breaking quantum cryptography

Commercial Quantum Cryptography System Hacked

This white hat hacker cracks quantum encryption for fun and profit

Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not

Quantum communications and encryption have been penetrated, they are secure, but not unbreakable. China isn't the only nation working on these systems, and they aren't the only ones explore the offensive and defense capabilities for defeating and protecting quantum communications either.
That's the beauty of network security. For new system being developed, there will be new techniques to exploit those systems. Perhaps will be different from previous techniques but will achieve the same goal. One of the biggest issues it faces is the maximum potential distance the current systems have. So to avoid it, they need to place repeaters and those repeaters are good target to intercept traffic.
 
.
Gov't, business propose quantum leap

2015-07-31 11:03

China Daily Editor: Si Huan

Alibaba will spend $4.8 million for 5 consecutive years to support creation of superfast computers

The Chinese Academy of Sciences and Alibaba announced the establishment of a joint quantum computing laboratory on Thursday in Shanghai with the goal of developing superfast quantum computers.

Alibaba will invest 30 million yuan ($4.8 million) a year for five years to support the research, and it will recruit top scientists from around the globe to work with scientists from the Chinese Academy of Sciences.

"The research into quantum computing has been carried out by universities and research institutes for a few decades. With such a basis of fundamental research, it is time to transfer the theory into applied technology," said Pan Jianwei, founder and director of quantum physics and quantum information with the University of Science and Technology of China's Hefei National Laboratory for Physical Sciences at Microscale. The university is affiliated with the Chinese Academy of Sciences.

Quantum computing refers to a theoretical new kind of computer that uses technology that would make it capable of calculations at speeds impossible for traditional computers.

Some world-leading companies, including Google and IBM, have been racing to develop such a computer, but commercial-grade quantum computers remain an unfulfilled dream.

"In 2014, IBM announced a plan to invest $3 billion on quantum computers and other related research fields in five years, which is impossible for any public research institution to afford. And it is not possible for us to compete with IBM if we can pay only 10 to 20 percent of the salary IBM pays to a leading expert," Pan said.

"As a result, the development of quantum computers needs support from the private sector. Without that support, we will lag behind developed countries in the race for future computing," he said.

Wang Jian, chief technology officer of Alibaba, said, "If I have to choose one of the most popular frontier technologies, I will pick quantum computing.

"Quantum technology will pose a revolutionary influence to cloud computing and empower mankind with an infinite computing capacity, which will offer a great opportunity to every technology company to transform from follower to leader," he said.

The five-year goal of the new lab is to build a quantum computer that has similar computing power to a regular commercial computer. The two sides then will review the achievement to decide on any further investment.

The 10-year goal is a computer that parallels the computing capacity of China's Tianhe-2 supercomputer, the world's fastest such machine.

Within 15 years, the capacity of the quantum computer is expected to be able to solve many currently inextricable problems.

The University of Science and Technology of China also signed strategic cooperation agreements with the Zhangjiang National Innovation Demonstration Zone in Shanghai on Thursday.

During a visit to Shanghai in May last year, President Xi Jinping called on Shanghai to become a global center for innovation in science and technology.

Gov't, business propose quantum leap
 
.
Quantum satellite set for launch early 2016 onboard a CZ-2D carrier rocket

Quantum revolution: China set to launch 'hack proof' quantum communications network

By Taku Dzimwasha

August 30, 2015 18:09 BST

baidu.php

China moves closer to “hack proof” quantum communications network (iStock)


China is set to complete the installation of the world's longest quantum communication network stretching 2,000km (1,240miles) from Beijing to Shanghai by 2016, say scientists leading the project. Quantum communications technology is considered to be "unhackable" and allows data to be transferred at the speed of light.

By 2030, the Chinese network would be extended worldwide, the South China Morning Post reported. It would make the country the first major power to publish a detailed schedule to put the technology into extensive, large-scale use.

The development of quantum communications technology has accelerated in the last five years. The technology works by two people sharing a message which is encrypted by a secret key made up of quantum particles, such as polarized photons. If a third person tries to intercept the photons by copying the secret key as it travels through the network, then the eavesdropper will be revealed by virtue of the laws of quantum mechanics – which dictate that the act of interfering with the network affects the behaviour of the key in an unpredictable manner.

If all goes to schedule, China would be the first country to put a quantum communications satellite in orbit, said Wang Jianyu, deputy director of the China Academy of Science's (CAS) Shanghai branch. At a recent conference on quantum science in Shanghai, Wang said scientists from CAS and other institutions have completed major research and development tasks for launching the satellite equipped with quantum communications gear, South China Morning Post said.

The potential success of the satellite was confirmed by China's leading quantum communications scientist, Pan Jianwei, a CAS academic who is also a professor of quantum physics at the University of Science and Technology of China (USTC) in Hefei, in the eastern province of Anhui. Pan said researchers reported significant progress on systems development after conducting experiments at a test center in the northwest of China.

The satellite would be used to transmit encoded data through a method called quantum key distribution (QKD), which relies on cryptographic keys transmitted via light pulse signals. QKD is said to be nearly impossible to hack, since any attempted eavesdropping would change the quantum states and thus could be quickly detected by dataflow monitors.

It's likely the technology initially will be used to transmit sensitive diplomatic, government policy and military information. Future applications could include secure transmissions of personal and financial data, Xinhua reported.

Governments in Europe, Japan and Canada are about to launch their own quantum communication satellite projects and a private company in the US has been seeking funding from the federal government with a proposal for a 10,000km network linking major cities.The Beijing to Shanghai project was launched last year. Although the Chinese government has not revealed the projects budget, scientists told state media that the construction cost would be ¥100m (£10.17m) for every 10,000 users, according to the South China Morning Post.

Quantum revolution: China set to launch 'hack proof' quantum communications network
 
. .
Reminds me of the movie "Mercury Rising". Let's wait and see!!
 
.
China Prepares to Build Jet Faster Than Legendary US Spy Plane?

MILITARY & INTELLIGENCE

16:30 30.08.2015

According to various reports, China is planning to develop a turbofan ramjet engine. Such an engine theoretically could be the basis for a jet faster than the legendary US SR-71 spy plane, the fastest aircraft, discharged in the late 1990s.

On August 25, a report in the Chinese newspaper China Aviation News described a planned project to build China's first domestically-made turbofan-ramjet combined cycle engine, designed for an unnamed aircraft.

“The description of this engine suggests something resembling the Pratt & Whitney J58 variable cycle engine used by the SR-71 Blackbird, which is also often described as a turbofan-ramjet engine, due to its unique bleed from the compressor to the afterburner which allows for increased thrust at high speeds,” China Aviation News wrote.

The report went on to mention, “a source close to the PLA Air Force was cited by New Outlook as stating that this is part of a project to develop a manned supersonic aircraft, currently in the preparation stages at a domestic research institute. The aircraft is expected to have a top speed faster than the Blackbird on completion, according to the source, although the project is yet to be formally launched,” wrote The National Interest.

The developments in the domestic production of more-sophisticated and reliable jet engines would be a great benefit for China.

At present, China is highly dependent on Russia for fighter engines, and in fact, reports suggest that the J-20 fifth-generation fighter is driven by Moscow’s advanced engines.

The ability to develop top-tier engines for a SR-71-style plane would be a major step up for China’s engine manufacturers.
 
.
Go China Go...World is looking upto next round of innovations from you.
Now that you have the bases in place, I am sure you will lead world in new dimension of technology growth :)
 
. .
Nothing is unhackable.

Quantum encryption is not hackable only in theory, and in ideal world. Not in real world, where many compromises have to be made to actually implement the technology, and develop things.

This has been proved. Search for the back and forth competition going on to prove this. Quantum encryption is formed, challenge started to invite people to hack it, and finally it actually gets hacked!
 
.
Nothing is unhackable.

Quantum encryption is not hackable only in theory, and in ideal world. Not in real world, where many compromises have to be made to actually implement the technology, and develop things.

This has been proved. Search for the back and forth competition going on to prove this. Quantum encryption is formed, challenge started to invite people to hack it, and finally it actually gets hacked!

This one is at the moment if you truly understand the technology. What is clear is China is ahead of the game. Both USA and EU are still experimenting on it, China is implementing it.

Excerpt

Today, the Chinese claim another small victory in this quantum space race. Jian-Wei Pan at the University of Science and Technology of China in Shanghai and a few pals say they’ve bounced single photons off an orbiting satellite and detected them back on Earth. That’s significant because it simulates a satellite sending single photons from orbit to the surface, crossing off another proof-of-principle milestone in their quantum checklist.
 
. . .
Quantum computer that 'computes without running' sets efficiency record

August 31, 2015 by Lisa Zyga feature



(a) The pulse sequences for the generalized CFC scheme keep the system in its ‘off’ state. (b) Populations of different states as a function of the number of repetitions of pulse sequences. (c) The green curve shows the simulated efficiency (reaching 85%) with practical imperfections, while the dotted curve shows the ideal efficiency (reaching 100%). The dashed line shows the 50% limit. Credit: Kong, et al. ©2015 American Physical Society

(Phys.org)—Due to quantum effects, it's possible to build a quantum computer that computes without running—or as the scientists explain, "the result of a computation may be learned without actually running the computer." So far, however, the efficiency of this process, which is called counterfactual computation (CFC), has had an upper limit of 50%, limiting its practical applications.

Now in a new paper, scientists have experimentally demonstrated a slightly different version called a "generalized CFC" that has an efficiency of 85% with the potential to reach 100%. This improvement opens the doors to realizing a much greater variety of applications, such as low-light medical X-rays and the imaging of delicate biological cells and proteins—in certain cases, using only a single photon.

The researchers, led by Prof. Jiangfeng Du at the University of Science and Technology of China and Prof. Liang Jiang at Yale University in the US, have published a paper on the high-efficiency counterfactual computing method in a recent issue of Physical Review Letters.

"The main keys to achieving high-efficiency CFC include the utilization of exotic quantum features (quantum superposition, quantum measurement, and the quantum Zeno effect), as well as the use of a generalized CFC protocol," Du told Phys.org.

How counterfactual computing works

By "not running," the scientists mean that the computer—which can operate in either an "on" subspace or an "off" subspace—stays in its "off" subspace for the entire computation. Physically maintaining the computer in the "off" subspace, in this scheme, involves controlling the spin properties of a diamond system, which acts as a quantum switch. Some of the spins must be kept in a superposition state, in which they occupy two states at the same time.

To control the spin superposition, the physicists took advantage of the quantum Zeno effect, in which frequent measurements on a system can "freeze" the system in its current state. By applying a sequence of pulses to the system, the scientists could keep the system in its "off" subspace, and so keep it from running.

"The procedure comprises a quantum switch and a quantum register," Jiang explained. "For each repetition, we prepare the quantum switch into a quantum superposition state, including two coherent parts ('on' and 'off'). Then the 'algorithm,' a NOT gate on the quantum register in our case, is performed in the 'on' subspace. Although it seems the computer has run in this step, a consequent projective measurement will remove all the changes in the 'on' subspace, since the probability of the whole system collapsing into the 'off' subspace during the measurement is very large (approaches 100% as the number of repetitions tends to infinity utilizing the quantum Zeno effect)."

The researchers explain that the "on" and "off" states can be thought of as the two paths of an interferometer, where a photon may take one path or the other, but not both.

"Such a situation is very similar to the case of a photon passing through a two-way interferometer," Jiang said. "When a detector on one of the paths catches the photon, then one says the photon does not go on the other path. Similarly, when the whole system collapses into the 'off' subspace, one can conclude that the computer does not run. After each repetition, the state changes slightly. It finally evolves to a certain value after N repetitions from its initial value. By detecting its state, we get the information that is 'programmed' in the computer, although the computer has not run."

Breaking the efficiency limit

Previous experimental CFC protocols have faced a counterfactual efficiency limit of 50%, where the counterfactual efficiency is defined as "the average probability of learning the result of a computation without running the computer." But the generalized CFC (first proposed by G. Mitchison and R. Jozsa in 2001) does not face this limit, which allowed the researchers in the new study to experimentally demonstrate an efficiency of 85% at 17 pulse repetitions.

"The key difference between the two protocols is that the 'off' subspace of the generalized CFC is dependent on the choice of the 'algorithm' (Ur), whereas it is independent in the controlled-Ur CFC," said coauthor Chenyong Ju at the University of Science and Technology of China. "As a consequence of this fact, the sum of the 'volume' of each 'off' subspace, which has a direct relation to the counterfactual efficiency, is much larger for the generalized CFC than the controlled-Ur CFC."

The higher efficiency opens up the possibility of developing highly efficient yet very low-light imaging technology. This technology could be useful in any situation in which light may damage or destroy the illuminated sample, which makes the method particularly relevant for biological imaging. Applications may include imaging green fluorescent proteins that might be bleached under laser light, as well as UV imaging of cells and safe X-ray imaging. In some situations, these applications might be performed using only a single photon.

"The use of one photon is just for the special case that the object to be imaged has only one pixel being transparent, whereas the other pixels are opaque," said coauthor Fei Kong at the University of Science and Technology of China. "To image the object with our protocol, one may imagine that the situation in which a photon is absorbed by an opaque pixel is just like the computer evolving into the 'on' subspace. Such a process is effectively avoided in our protocol. The photon will eventually 'find' the transparent pixel and pass through it. Through a detector below, one can locate this pixel and hence accomplish the imaging with just one photon. The number of photons needed is proportional to the number of transparent pixels, whereas normal imaging methods need [many more] photons."

In the future, the researchers also plan to investigate potential applications of counterfactual computing for secure communication.

"We are looking forward to exploring more realistic applications of the generalized CFC," Du said. "There are several recent works on the topic of counterfactual quantum cryptography and communication. Employing the counterfactual quantum phenomenon, several groups have proposed and demonstrated a new model of secret communication in which no physical signal particles are transmitted, which provides practical security advantages. [For example, see here, here, and here.] We wonder what the potential of the generalized CFC is in this area."

Quantum computer that 'computes without running' sets efficiency record
 
. .

Latest posts

Country Latest Posts

Back
Top Bottom