This site may earn affiliate commissions from the links on this folio. Terms of apply.

A new grade of breakthrough dot has been adult by an international squad of researchers that can produce identical photons at will, paving the way for multiple revolutionary new uses for light. Many upcoming breakthrough technologies will require a source of multiple lonely photons with identical properties, and for the first time these researchers may have an efficient way to make them. With these quantum dots at their disposal, engineers might be able to start thinking well-nigh new, big-scale breakthrough communications networks.

The reason nosotros demand identical photons for quantum communication comes back to the non-quantum idea of key distribution. From a mathematics perspective, it's trivially like shooting fish in a barrel to encrypt any message so thatnobody can read it, only very difficult to encrypt a message so merelysome select individuals can read it, and nobody else. The reason is key distribution: if everybody who needs to decrypt a message has the associated key needed for decryption, so no problem. So how practise you get the primal to everyone who needs to decrypt it?

This Stanford invention helps handle entangled photons, but does it introduce vulnerabilities in the process?

This Stanford invention helps handle entangled photons, only does information technology introduce vulnerabilities in the process?

Quantum key distribution uses the ability of quantum physics to provide evidence of surveillance. Rather than making it impossible to intercept the key, and thus decrypt the message, quantum fundamental distribution simply makes it impossible to secretly intercept the primal, thus giving the sender of the message alarm that they should endeavour once more with a new key until i gets through successfully. Once you lot're sure that your intended recipient has the key, and just as importantly that nobody else has it, and then yous could send the actual encrypted file via smoke signal if you really wanted to — at that point, the security of the transmission itself really shouldn't thing.

There has been some promising research in this field — it's not to be dislocated with the much more than preliminary work on using quantum entanglement to transfer information in such a way that it literally does not traverse the intervening space.That may come along anytime, but non for a long, long time.

Regardless, one of the big bug with implementing quantum key distribution is that the optical technology necessary to become these surveillance-enlightened signals from sender to recipient just aren't at that place. In item, the wavelength of photons changes as they move down an optical fiber — not adept, since creating photon with precise attributes is the whole source of quantum security.

An Optalysys optical computer, on a desktop

An Optalysys optical computer, on a desktop. Quantum dot engineering science could allow photons, non electrons, to drive adjacent-gen computer processors.

And so, unless you're less than ane quantum dot's range away from the person y'all want to talk to, quantum security wouldn't work; a theoretical breakthrough repeater would insert too much uncertainty almost the wavelength of any light it ferried along. With this technology, it could exist possible ferry quantum cryptographic information across existent-world distances, across or even between continents in the networked way of regular digital net traffic.

These breakthrough dots basically achieve perfect single-photon emission by super-cooling the quantum dots so the emitting atoms exercise non fluctuate. These fluctuations results in very slightly different emission wavelengths, so past slowing them with cryogenic temperatures, they reduce the signal noise. This should allow the re-emission of breakthrough primal information in a reliable-enough course to preserve the breakthrough security setup.

Of course, quantum security isn't perfect. Y'all can still listen in on either the sender or receiver direct, or perhaps even find a way to surveil these quantum dots themselves, reading each photon as it'southward absorbed and reemitted. Potential attackers could install optical splitters so they get and invalidate one copy of the key, while another arrives unmolested at its destination.

Curt of telepathy, there volition never exist perfect communication security — not even breakthrough physics tin can change that.