Anonymous ID: 542c38 April 21, 2020, 1:44 p.m. No.14212   🗄️.is 🔗kun

>>14201

 

I love how this all comes together as we dig to-get-her. Heroes at play. Keeping an eye on this particular story.

So I have always found this concept very interesting…Humans make this complexity so simple. So simple we don't even have to think about it.

Quantum cryptography key exchange. The concept is when a quantum computer exchanges key information between two entities over a fiber optic cable (that has limitations of distance BTW) if anything attempts to "manipulate" or even "observe" the photon light "packet" of information the key is compromised and the steam of "data" or "information" is no longer valid. It is pretty incredible that we have tangible physical world interpretation of these events we to unconsciously all day long. We are so much more powerful than we realize. No force can compromise our systems when we learn the truth of our true nature. It correlates beautify with the mystery posts. Layer upon layer we go.

 

Fun quantum key exchange info….as always it is what it is as we feel up the elephant in the room. (:

The security of QKD is based on the inviolability of the laws of quantum mechanics and provably secure(information theoretic) data handling protocols. Eve can neither “tap” the key transmissions owing to the indivisibil-ity of quanta2 nor copy them because of the quantum "no-cloning" theorem.3 At a deeper level, QKD resistsinterception and retransmission by an eavesdropper because in quantum mechanics, in contrast to the classical world, the result of a measurement cannot be thought of as revealing a “possessed value” of a quantum state. A unique aspect of quantum cryptography is that Heisenberg’s uncertainty principle ensures that if Eve attempts tointercept and measure Alice's quantum transmissions, her activities must produce an irreversible change in the quantum states (“collapse of the wave function”) that are retransmitted to Bob. These changes will introduce ananomalously high error rate in the transmissions between Alice and Bob, allowing them to detect the attempted eavesdropping. In particular, from the observed error rate Alice and Bob can put an upper bound on any partial 2knowledge that an eavesdropper may have acquired by monitoring their transmissions. This bound allows the intended users to apply conventional information theoretic techniques to distill a secret error free key

 

https://arxiv.org/ftp/quant-ph/papers/9904/9904038.pdf