Jump to content

JohnWB07

Members
  • Posts

    8
  • Joined

  • Last visited

Everything posted by JohnWB07

  1. The technology that currently exists allows the system to send up to 120km wireless transmission. They have also used fiber optics to transmit, but I don't see a fiber optic network being very successful since it would have to be a star-network. This means that every computer is linked to a server and cannot communicate except through the server. Even a star network like this between 10 computers would become very slow. Just imagine if it gets really popular and it becomes a global interest. I think the only real future this system has is if the system can communicate with satellites and create a wireless global network. Another question this raises is, if satellites can be used in this system, will you be able to send encrypted keys between LA and NY and NY to LA at the same time? For example I want to send something to LA, and someone in LA wants to send something to my region. Will the key be able to get through?
  2. There are two companies that I know of that are already selling this system. Magiq http://www.magiqtech.com and ID Quantique http://www.idquantique.com however, there are still downfalls to this system. If there is interest I can post what I have found in my research.
  3. I loved the first one. It was fresh and a great new idea. The cinemetography was excellent, but then they changed for real people and cool but limited special effects. That scene with all the Smiths fighting was just painful because it was like watching a cartoon. That's what was so great about the first one...sure there were wires...sure there were loads of cameras, but it was real people in the fighting scene.
  4. This is more of a computer science + quantum physics subject. But I've been looking at quantum encryption where Alice sends Bob a photon. Bob determines if the polarization of the photon is | - / \ using filters + and x. Bob then tells Alice which filter he used and Alice responds with which ones are correct. For example: Alice: | | \ - / Bob (filter used): + x x + + Correct filter (Y/N): Y N Y Y N Binary: 0 N/A 0 1 N/A My question from earlier is in case there is an Eavesdropper "Eve" who can predict what filter to use based on giving Alice a virus of some sort. Thanks, John
  5. I have a quick question. If I sent a photon through a fiber-optic cable from point A and measured the polarization of the photon at point B , and then measured it again at point C, would the results between B and C be the same? A -----------B-----------C Thanks.
  6. I have a question on Quantum Encryption. I've been doing a lot of research lately on it and the vendors claim that it is an unbreakable code for key distribution. The basics are that if Alice sends Bob a photon, Bob measures the polarization of that photon which translates into binary. Bob uses a filter to do this. If Bob guesses the right filter to measure the polarization of the photon then in a public conversation Alice will tell Bob that he used the right filter and that photon is translated into a bit. My question is what if Eve uses the same filters as Bob every time a photon was sent? Could she be able to get the key without either Alice or Bob knowing? Thank You -John
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.