{"id":4315,"date":"2021-07-21T00:15:52","date_gmt":"2021-07-20T22:15:52","guid":{"rendered":"https:\/\/equinoxgroup.eu\/?p=4315"},"modified":"2022-11-10T01:15:43","modified_gmt":"2022-11-10T00:15:43","slug":"researchers-create-attack-proof-quantum-communication","status":"publish","type":"post","link":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/","title":{"rendered":"Quantum Communication and Quantum Key Distribution"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css=&#8221;.vc_custom_1668038057362{margin-top: -320px !important;}&#8221; el_class=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1667738431109{padding-top: -200px !important;}&#8221;]<span data-offset-key=\"1j3vo-25-0\">Quant<\/span><span data-offset-key=\"1j3vo-26-0\">um<\/span><span data-offset-key=\"1j3vo-27-0\"> key<\/span><span data-offset-key=\"1j3vo-28-0\"> distribution<\/span><span data-offset-key=\"1j3vo-29-0\"> is<\/span><span data-offset-key=\"1j3vo-30-0\"> a<\/span><span data-offset-key=\"1j3vo-31-0\"> secure<\/span><span data-offset-key=\"1j3vo-32-0\"> communication<\/span><span data-offset-key=\"1j3vo-33-0\"> method<\/span><span data-offset-key=\"1j3vo-34-0\"> that<\/span><span data-offset-key=\"1j3vo-35-0\"> makes<\/span><span data-offset-key=\"1j3vo-36-0\"> use<\/span><span data-offset-key=\"1j3vo-37-0\"> of<\/span><span data-offset-key=\"1j3vo-38-0\"> the<\/span><span data-offset-key=\"1j3vo-39-0\"> properties<\/span><span data-offset-key=\"1j3vo-40-0\"> of<\/span><span data-offset-key=\"1j3vo-41-0\"> quantum<\/span><span data-offset-key=\"1j3vo-42-0\"> mechanics<\/span><span data-offset-key=\"1j3vo-43-0\"> to<\/span><span data-offset-key=\"1j3vo-44-0\"> share<\/span><span data-offset-key=\"1j3vo-45-0\"> a<\/span><span data-offset-key=\"1j3vo-46-0\"> secret<\/span><span data-offset-key=\"1j3vo-47-0\"> key<\/span><span data-offset-key=\"1j3vo-48-0\"> between<\/span><span data-offset-key=\"1j3vo-49-0\"> two<\/span><span data-offset-key=\"1j3vo-50-0\"> parties<\/span><span data-offset-key=\"1j3vo-51-0\">.<\/span><span data-offset-key=\"1j3vo-52-0\"> This<\/span><span data-offset-key=\"1j3vo-53-0\"> key<\/span><span data-offset-key=\"1j3vo-54-0\"> can<\/span><span data-offset-key=\"1j3vo-55-0\"> then<\/span><span data-offset-key=\"1j3vo-56-0\"> be<\/span><span data-offset-key=\"1j3vo-57-0\"> used<\/span><span data-offset-key=\"1j3vo-58-0\"> to<\/span><span data-offset-key=\"1j3vo-59-0\"> encrypt<\/span><span data-offset-key=\"1j3vo-60-0\"> and<\/span><span data-offset-key=\"1j3vo-61-0\"> decrypt<\/span><span data-offset-key=\"1j3vo-62-0\"> messages<\/span><span data-offset-key=\"1j3vo-63-0\"> sent<\/span><span data-offset-key=\"1j3vo-64-0\"> between<\/span><span data-offset-key=\"1j3vo-65-0\"> the<\/span><span data-offset-key=\"1j3vo-66-0\"> parties<\/span><span data-offset-key=\"1j3vo-67-0\">.<\/span> <span data-offset-key=\"1j3vo-70-0\">Quant<\/span><span data-offset-key=\"1j3vo-71-0\">um<\/span><span data-offset-key=\"1j3vo-72-0\"> communication<\/span><span data-offset-key=\"1j3vo-73-0\"> is<\/span><span data-offset-key=\"1j3vo-74-0\"> a<\/span><span data-offset-key=\"1j3vo-75-0\"> field<\/span><span data-offset-key=\"1j3vo-76-0\"> of<\/span><span data-offset-key=\"1j3vo-77-0\"> physics<\/span><span data-offset-key=\"1j3vo-78-0\"> that<\/span><span data-offset-key=\"1j3vo-79-0\"> studies<\/span><span data-offset-key=\"1j3vo-80-0\"> the<\/span><span data-offset-key=\"1j3vo-81-0\"> transmission<\/span><span data-offset-key=\"1j3vo-82-0\"> of<\/span><span data-offset-key=\"1j3vo-83-0\"> information<\/span><span data-offset-key=\"1j3vo-84-0\"> using<\/span><span data-offset-key=\"1j3vo-85-0\"> quantum<\/span><span data-offset-key=\"1j3vo-86-0\"> mechanical<\/span><span data-offset-key=\"1j3vo-87-0\"> effects<\/span><span data-offset-key=\"1j3vo-88-0\">.<\/span> <span data-offset-key=\"1j3vo-91-0\">Quant<\/span><span data-offset-key=\"1j3vo-92-0\">um<\/span><span data-offset-key=\"1j3vo-93-0\"> ent<\/span><span data-offset-key=\"1j3vo-94-0\">ang<\/span><span data-offset-key=\"1j3vo-95-0\">lement<\/span><span data-offset-key=\"1j3vo-96-0\"> is<\/span><span data-offset-key=\"1j3vo-97-0\"> a<\/span><span data-offset-key=\"1j3vo-98-0\"> phenomenon<\/span><span data-offset-key=\"1j3vo-99-0\"> in<\/span><span data-offset-key=\"1j3vo-100-0\"> which<\/span><span data-offset-key=\"1j3vo-101-0\"> two<\/span><span data-offset-key=\"1j3vo-102-0\"> particles<\/span><span data-offset-key=\"1j3vo-103-0\"> become<\/span><span data-offset-key=\"1j3vo-104-0\"> intimately<\/span><span data-offset-key=\"1j3vo-105-0\"> linked<\/span><span data-offset-key=\"1j3vo-106-0\">,<\/span><span data-offset-key=\"1j3vo-107-0\"> even<\/span><span data-offset-key=\"1j3vo-108-0\"> if<\/span><span data-offset-key=\"1j3vo-109-0\"> they<\/span><span data-offset-key=\"1j3vo-110-0\"> are<\/span><span data-offset-key=\"1j3vo-111-0\"> separated<\/span><span data-offset-key=\"1j3vo-112-0\"> by<\/span><span data-offset-key=\"1j3vo-113-0\"> large<\/span><span data-offset-key=\"1j3vo-114-0\"> distances<\/span><span data-offset-key=\"1j3vo-115-0\">.<\/span><span data-offset-key=\"1j3vo-116-0\"> This<\/span><span data-offset-key=\"1j3vo-117-0\"> ent<\/span><span data-offset-key=\"1j3vo-118-0\">ang<\/span><span data-offset-key=\"1j3vo-119-0\">lement<\/span><span data-offset-key=\"1j3vo-120-0\"> can<\/span><span data-offset-key=\"1j3vo-121-0\"> be<\/span><span data-offset-key=\"1j3vo-122-0\"> used<\/span><span data-offset-key=\"1j3vo-123-0\"> to<\/span><span data-offset-key=\"1j3vo-124-0\"> transmit<\/span><span data-offset-key=\"1j3vo-125-0\"> information<\/span><span data-offset-key=\"1j3vo-126-0\"> instant<\/span><span data-offset-key=\"1j3vo-127-0\">aneously<\/span><span data-offset-key=\"1j3vo-128-0\"> between<\/span><span data-offset-key=\"1j3vo-129-0\"> the<\/span><span data-offset-key=\"1j3vo-130-0\"> particles<\/span><span data-offset-key=\"1j3vo-131-0\">,<\/span><span data-offset-key=\"1j3vo-132-0\"> regardless<\/span><span data-offset-key=\"1j3vo-133-0\"> of<\/span><span data-offset-key=\"1j3vo-134-0\"> how<\/span><span data-offset-key=\"1j3vo-135-0\"> far<\/span><span data-offset-key=\"1j3vo-136-0\"> apart<\/span><span data-offset-key=\"1j3vo-137-0\"> they<\/span><span data-offset-key=\"1j3vo-138-0\"> are<\/span><span data-offset-key=\"1j3vo-139-0\">.<\/span> <span data-offset-key=\"1j3vo-142-0\">Quant<\/span><span data-offset-key=\"1j3vo-143-0\">um<\/span><span data-offset-key=\"1j3vo-144-0\"> cryptography<\/span><span data-offset-key=\"1j3vo-145-0\"> is<\/span><span data-offset-key=\"1j3vo-146-0\"> a<\/span><span data-offset-key=\"1j3vo-147-0\"> method<\/span><span data-offset-key=\"1j3vo-148-0\"> of<\/span><span data-offset-key=\"1j3vo-149-0\"> securely<\/span><span data-offset-key=\"1j3vo-150-0\"> transmitting<\/span><span data-offset-key=\"1j3vo-151-0\"> information<\/span><span data-offset-key=\"1j3vo-152-0\"> using<\/span><span data-offset-key=\"1j3vo-153-0\"> the<\/span><span data-offset-key=\"1j3vo-154-0\"> principles<\/span><span data-offset-key=\"1j3vo-155-0\"> of<\/span><span data-offset-key=\"1j3vo-156-0\"> quantum<\/span><span data-offset-key=\"1j3vo-157-0\"> mechanics<\/span><span data-offset-key=\"1j3vo-158-0\">.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;230px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;20px&#8221; el_class=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column][vc_empty_space height=&#8221;216px&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-hz-jquery&#8221; bg_image_new=&#8221;id^4320|url^https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg|caption^Quantum Cryptography|alt^Quantum Cryptography|title^Quantum Cryptography|description^Quantum Cryptography&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_image_size=&#8221;contain&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][vc_empty_space height=&#8221;100px&#8221; el_class=&#8221;vc_hidden-xs&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;50px&#8221; el_class=&#8221;vc_hidden-xs&#8221;][vc_custom_heading icon=&#8221;stm-mumbai_security&#8221; text=&#8221;Two Steps Ahead: Researchers Create Attack-Proof Quantum Communication&#8221; font_container=&#8221;tag:h2|font_size:32|text_align:left|line_height:1&#8243; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInLeft&#8221;][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1620565725690{margin-bottom: 20px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243; css=&#8221;.vc_custom_1664351855227{padding-right: 45px !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1664351890686{background-color: #f2f4fa !important;}&#8221;][vc_column_inner width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1664351763928{margin-top: 50px !important;}&#8221;]<div class=\"audioplayer-tobe  playerid-4335 ap_idx_4315_1 is-single-player apconfig-default-settings-for-zoomsounds button-aspect-noir  skin-wave  ap4335 auto-init\"  data-options='{\"skinwave_comments_playerid\":4335,\"design_skin\":\"skin-wave\",\"disable_scrubbar\":\"off\",\"skinwave_enablereflect\":\"on\",\"skinwave_wave_mode_canvas_waves_number\":\"3\",\"skinwave_wave_mode_canvas_waves_padding\":\"1\",\"skinwave_wave_mode_canvas_reflection_size\":\"0.25\",\"cue\":\"auto\",\"embedded\":\"off\",\"mobile_disable_fakeplayer\":\"on\",\"settings_php_handler\":\"wpdefault\"}' style=\" opacity: 0; \" data-posttype=\"attachment\" id=\"ap4335\" data-playerid=\"4335\" data-computed-playerid=\"4335\" data-real-playerid=\"4335\" data-sanitized_source=\"httpsequinoxgroupeuwpcontentuploads202107QuantumCryptographyFinalmp3\" data-sample_time_total=\"284\" data-pcm='[0.19,0.04,0.13,0.3,0.09,0.24,0.05,0.17,0.08,0.35,0.07,0.28,0,0.17,0.19,0.21,0.28,0.13,0.07,0.16,0.18,0.11,0.13,0.29,0.3,0.02,0.28,0.24,0.22,0.06,0.37,0.06,0.22,0.2,0.28,0.06,0.21,0.18,0.09,0.13,0.04,0.15,0.07,0.1,0.36,0.12,0.27,0.16,0.25,0.13,0.39,0.19,0.11,0.11,0.08,0.14,0.07,0.05,0.21,0.11,0.25,0.14,0.07,0.18,0.39,0.24,0.11,0.27,0.29,0.2,0.3,0.22,0.04,0.06,0.19,0.12,0.04,0.05,0.25,0.12,0.18,0.16,0.19,0.16,0.18,0.19,0.24,0.02,0.04,0.28,0.04,0.13,0.15,0.11,0.09,0.25,0.05,0.18,0.05,0.37,0.2,0.14,0.04,0.23,0.1,0.16,0.08,0.24,0.19,0.06,0.18,0.22,0.01,0.09,0.09,0.18,0.11,0.18,0.13,0.12,0.05,0.21,0.21,0.08,0.45,0.02,0.14,0.02,0.02,0.06,0.2,0.09,0.39,0.09,0.04,0.16,0.08,0.08,0.12,0.24,0,0.26,0.24,0.23,0.26,0.18,0.19,0.1,0.27,0.29,0.09,0.07,0.28,0.24,0.19,0.1,0.3,0.14,0.19,0.16,0.15,0.11,0.25,0.06,0.24,0.3,0.16,0.31,0.12,0.28,0.14,0.16,0.28,0.15,0.04,0.23,0.34,0.07,0.21,0.21,0.19,0.33,0.31,0.09,0.05,0.25,0.18,0.14,0.29,0.12,0.1,0.22,0.29,0.19,0.21,0.12,0.16,0.04,0.08,0.08,0.39,0.25,0.21,0.23,0.14,0.05,0.19,0.05,0.18,0.25,0.18,0.38,0.07,0.23,0.16,0.12,0.12,0.08,0.28,0.03,0.01,0.29,0.32,0.12,0.21,0.3,0.01,0.14,0.25,0.21,0.2,0.21,0.24,0.14,0.24,0.12,0.23,0.14,0.32,0.07,0.29,0.08,0.1,0.19,0.14,0.2,0.09,0.32,0.03,0.27,0.07,0.22,0.18,0.19,0.28,0.14,0.11,0.08,0.29,0.29,0.36,0.13,0.27,0.17,0.04,0.06,0.17,0.24,0.27,0.18,0.11,0.23,0.18,0.06,0.33,0.13,0.21,0.12,0.27,0.34,0.01,0.2,0.17,0.21,0.14,0.18,0.11,0.12,0.21,0.02,0.24,0.06,0.39,0.15,0.23,0.15,0.01,0.26,0.17,0.27,0.07,0.13,0.19,0.02,0.33,0.01,0.03,0.16,0.2,0.18,0.31,0.05,0.27,0.19,0.12,0.2,0.1,0.18,0.15,0.17,0.15,0.24,0.28,0.05,0.03,0.23,0.21,0.03,0.17,0.25,0.13,0.21,0.24,0.33,0.31,0.17,0.38,0.16,0.17,0.14,0.06,0.11,0.11,0.17,0.06,0.11,0.21,0.1,0.03,0.17,0.11,0.16,0.31,0.04,0.15,0.08,0.15,0.16,0.11,0.05,0.15,0.17,0.15,0.21,0.2,0.2,0.07,0.08,0.05,0.14,0.09,0.12,0.22,0.15,0.2,0.27,0.27,0.31,0.22,0.05,0.07,0.13,0.19,0.13,0.14,0.16,0.22,0.24,0.16,0.16,0.31,0.13,0.31,0.05,0.27,0.15,0,0.17,0.14,0.24]' data-type=\"audio\" data-source=\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography-Final.mp3\" data-playfrom=\"off\"><div hidden class=\"feed-dzsap feed-artist-name\">Algorithmic BrAIn Text-to-speech: Two Steps Ahead: Researchers Create Attack-Proof Quantum Communication<\/div><div hidden class=\"feed-dzsap feed-song-name\">Tired of reading? Listen instead!<\/div><div class=\"meta-artist track-meta-for-dzsap\"><span class=\"the-artist first-line\"><span class=\"first-line-label\" >Algorithmic BrAIn Text-to-speech: Two Steps Ahead: Researchers Create Attack-Proof Quantum Communication<\/span><\/span><span class=\"the-name the-songname second-line\" >Tired of reading? Listen instead!<\/span><\/div><div class=\"menu-description\"><span class=\"the-artist\">Algorithmic BrAIn Text-to-speech: Two Steps Ahead: Researchers Create Attack-Proof Quantum Communication<\/span><span class=\"the-name\">Tired of reading? Listen instead!<\/span><\/div><div hidden class=\"feed-dzsap feed-dzsap--extra-html feed-dzsap--extra-html--bottom-left \"><span class=\"btn-zoomsounds btn-like\"><span class=\"the-icon\"><svg xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" width=\"15\" height=\"15\"  viewBox=\"0 0 645 700\" id=\"svg2\"> <defs id=\"defs4\" \/> <g id=\"layer1\"> <path d=\"M 297.29747,550.86823 C 283.52243,535.43191 249.1268,505.33855 220.86277,483.99412 C 137.11867,420.75228 125.72108,411.5999 91.719238,380.29088 C 29.03471,322.57071 2.413622,264.58086 2.5048478,185.95124 C 2.5493594,147.56739 5.1656152,132.77929 15.914734,110.15398 C 34.151433,71.768267 61.014996,43.244667 95.360052,25.799457 C 119.68545,13.443675 131.6827,7.9542046 172.30448,7.7296236 C 214.79777,7.4947896 223.74311,12.449347 248.73919,26.181459 C 279.1637,42.895777 310.47909,78.617167 316.95242,103.99205 L 320.95052,119.66445 L 330.81015,98.079942 C 386.52632,-23.892986 564.40851,-22.06811 626.31244,101.11153 C 645.95011,140.18758 648.10608,223.6247 630.69256,270.6244 C 607.97729,331.93377 565.31255,378.67493 466.68622,450.30098 C 402.0054,497.27462 328.80148,568.34684 323.70555,578.32901 C 317.79007,589.91654 323.42339,580.14491 297.29747,550.86823 z\" id=\"path2417\" style=\"\" \/> <g transform=\"translate(129.28571,-64.285714)\" id=\"g2221\" \/> <\/g> <\/svg><\/span><span class=\"the-label hide-on-active\">Like<\/span><span class=\"the-label show-on-active\">Liked<\/span><\/span><\/div><div hidden class=\"feed-dzsap feed-dzsap--extra-html\" data-playerid=\"4335\" style=\"opacity:0;\"><div class=\"dzsap-counter counter-hits\"><i class=\"fa fa-play\"><\/i><span class=\"the-number\">5<\/span><\/div><div class=\"dzsap-counter counter-likes\"><i class=\"fa fa-heart\"><\/i><span class=\"the-number\">4<\/span><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1664351951398{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;background: #153e4d url(https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/06\/Website-Narration.jpg?id=4189) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_custom_heading icon=&#8221;fas fa-assistive-listening-systems&#8221; icon_size=&#8221;34&#8243; stm_title_font_weight=&#8221;700&#8243; text=&#8221;&#8221; font_container=&#8221;tag:h2|font_size:34|text_align:left|color:%23153e4d|line_height:0.8&#8243; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;none&#8221; subtitle=&#8221;Prefer to listen?&#8221; subtitle_color=&#8221;#ffffff&#8221; css=&#8221;.vc_custom_1664325096040{margin-right: -10px !important;margin-left: -10px !important;}&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #ffffff; font-size: 12pt; text-align: justify;\">If you prefer to listen to, instead of reading the text on this page, all you need to do is to put your device sound on, hit the play button on the left,\u00a0 sit back, relax and leave everything else to us.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=&#8221;.vc_custom_1667126167122{margin-top: 32px !important;}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Quantum Key Distribution, a method of secure communication, uses quantum mechanics to encrypt data. Although Quantum Key Distribution&#8217;s security is inherently unbreakable, attackers could still steal vital information if it is not properly implemented. Side-channel attacks may be used by attackers to capitalise on weaknesses in the information system to spy on secret key exchanges.<\/p>\n<p style=\"text-align: justify;\">Two methods to make sure that Quantum Key Distribution communications are safe from attack have been developed by researchers at the National University of Singapore (NUS). One is experimental and the other theoretical. The first protocol is a highly-secure cryptography protocol that can easily be used in any network that requires long-term security. The second is a device \u2013 the first of its kind \u2013 designed to protect Quantum Key Distribution systems from bright light pulse attacks by creating a power threshold.<\/p>\n<p style=\"text-align: justify;\">Nobody can take today\u2019s most complex security software for granted due to rapid advances in algorithmic research, and other areas of quantum computing. These two new approaches promise to ensure that information systems used for banking, healthcare, and data storage are protected from future attacks.<\/p>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;Future-proof quantum communication protocol&#8221; font_container=&#8221;tag:h2|font_size:28|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">In Quantum Key Distribution, there are two measurement settings. One is used to generate the key; the other to verify the channel&#8217;s integrity. The NUS team demonstrated that their protocol allows users to independently test another party&#8217;s encryption device using two different key generation settings. They showed that it is harder for an eavesdropper to steal information by providing additional key-generating measures for users.<\/p>\n<p style=\"text-align: justify;\">The new protocol is simpler to set up than the original Quantum Key Distribution protocol that was device-independent. It is also more resistant to loss and noise and provides quantum communications users with the best level of security while allowing them to verify their key generation devices.<\/p>\n<p style=\"text-align: justify;\">This setup ensures that all information systems using device-independent Quantum Key Distribution are free from misconfiguration and mis-implementation. It makes data safe from attackers, even though they may have unlimited quantum computing power. This method could create a secure information system that eliminates all side-channel attacks. It should also allow end-users to easily monitor security implementations with confidence.<\/p>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;First of its kind quantum power limiter device&#8221; font_container=&#8221;tag:h2|font_size:28|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Quantum cryptography uses optical pulses of very low light intensity to exchange data on untrusted networks. Quantum entanglement can be used to secure secret keys, create truly random numbers, or even create banknotes that cannot mathematically be forged.<\/p>\n<p style=\"text-align: justify;\">Experiments have shown that bright light pulses can be injected into the quantum cryptosystem to compromise its security. This side-channel attack strategy uses the fact that brightly injected light is reflected back to the outside world, which reveals the secrets kept within the quantum cryptosystem.<\/p>\n<p style=\"text-align: justify;\">The NUS researchers published a <a href=\"https:\/\/journals.aps.org\/prxquantum\/abstract\/10.1103\/PRXQuantum.2.030304\">paper in PRX Quantum of 7 July 2021<\/a>. It describes their first attempt to solve the problem. The device uses thermo-optical defocusing effects that limit the energy of the incoming sunlight. Researchers use the fact that bright light causes a change in the refractive index of transparent plastic material embedded within the device. This allows it to send only a fraction of the light through the quantum channel, creating a power limit.<\/p>\n<p style=\"text-align: justify;\">The power limiter used by the NUS team can be described as an optical equivalent to an electric fuse. However, it is reversible so that it does not blow up when the energy threshold has been exceeded. It is cost-effective and easily made with off-the-shelf components and doesn&#8217;t even require power and can easily be added to any quantum cryptography systems to increase its implementation security.<\/p>\n<p style=\"text-align: justify;\">It is imperative to close that gap between theory and practice in quantum secure communications if it is to be used for the future Quantum Internet. This holistic approach is the best as it not only designs more quantum protocols but also engineers quantum devices that closely match the mathematical models used by the protocols.<\/p>\n<p>[\/vc_column_text]<div class=\"templatera_shortcode\"><style type=\"text\/css\" data-type=\"vc_shortcodes-default-css\">.vc_do_custom_heading{margin-bottom:0.625rem;margin-top:0;}.vc_do_custom_heading{margin-bottom:0.625rem;margin-top:0;}.vc_do_btn{margin-bottom:22px;}<\/style><style type=\"text\/css\" data-type=\"vc_shortcodes-custom-css\">.vc_custom_1667111652227{margin-top: 48px !important;}.vc_custom_1713917281413{margin-top: 14px !important;margin-bottom: 42px !important;padding-bottom: 12px !important;}.vc_custom_1667116849933{margin-top: 28px !important;margin-bottom: 28px !important;}.vc_custom_1713917315239{margin-top: 14px !important;margin-bottom: 42px !important;padding-bottom: 12px !important;}<\/style><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1667111652227\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner \"><div class=\"wpb_wrapper\">\t<div class=\"vc_separator wpb_content_element vc_sep_width_100 vc_sep_border_width_3 type_1  vc_separator_no_text\">\n\t\t<span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#fde952;\" class=\"vc_sep_line\"><\/span><\/span>\n\t\t\t\t<span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#fde952;\" class=\"vc_sep_line\"><\/span><\/span>\n\t<\/div>\n\t\n<div class=\"vc_custom_heading vc_custom_1713917281413 text_align_left has_icon\" ><div class=\"icon\" style=\"font-size: 36px; line-height: 36px;\"><i class=\"far fa-newspaper\"><\/i><\/div><h2 style=\"font-size: 30px;text-align: left\" class=\"consulting-custom-title\">More Recent News Items<\/h2><\/div><div class=\"vc_empty_space\"   style=\"height: 24px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\n    <div class=\"stm_news \">\n        <ul class=\"news_list posts_per_row_4\">\n\n            \n                                <li class=\"view_style_3\">\n                    <div class=\"post_item\">\n                                                    <a href=\"https:\/\/equinoxgroup.eu\/how-claude-3-5-is-trying-to-revolutionise-automation-through-autonomous-ai-agents\/\" class=\"image\">\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2024\/10\/How-Claude-3.5-Is-Trying-to-Revolutionise-Automation-through-Autonomous-AI-agents-260x170.jpg\" width=\"260\" height=\"170\" alt=\"How Claude 3.5 Is Trying to Revolutionise Automation through Autonomous AI agents\" title=\"How Claude 3.5 Is Trying to Revolutionise Automation through Autonomous AI agents\" loading=\"lazy\" \/>                            <\/a>\n                                                <div class=\"content\">\n                            <a href=\"https:\/\/equinoxgroup.eu\/how-claude-3-5-is-trying-to-revolutionise-automation-through-autonomous-ai-agents\/\" class=\"title base_font_color\">\n                                <h5 class=\"secondary_font_color_hv\">How Claude 3.5 Is Trying to Revolutionise Automation through Autonomous AI agents<\/h5>\n                            <\/a>\n                            <div class=\"description\">\n                                                            <\/div>\n                            <a href=\"https:\/\/equinoxgroup.eu\/how-claude-3-5-is-trying-to-revolutionise-automation-through-autonomous-ai-agents\/\" class=\"read_more\">\n                                <i class=\"stm-lnr-arrow-right third_bg_color base_bg_color_hv\"><\/i>\n                                <span>\n                                Read more                                <\/span>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                <\/li>\n\n            \n                                <li class=\"view_style_3\">\n                    <div class=\"post_item\">\n                                                    <a href=\"https:\/\/equinoxgroup.eu\/ai-achieves-major-milestone-in-aerial-combat-fuelling-debate-on-the-future-of-warfare\/\" class=\"image\">\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2024\/04\/Autonomous-Flight-260x170.jpg\" width=\"260\" height=\"170\" alt=\"Lethal Autonomous Weapon\" title=\"Lethal Autonomous Weapon\" loading=\"lazy\" \/>                            <\/a>\n                                                <div class=\"content\">\n                            <a href=\"https:\/\/equinoxgroup.eu\/ai-achieves-major-milestone-in-aerial-combat-fuelling-debate-on-the-future-of-warfare\/\" class=\"title base_font_color\">\n                                <h5 class=\"secondary_font_color_hv\">AI Achieves Major Milestone in Aerial Combat, Fuelling Debate on the Future of Warfare<\/h5>\n                            <\/a>\n                            <div class=\"description\">\n                                                            <\/div>\n                            <a href=\"https:\/\/equinoxgroup.eu\/ai-achieves-major-milestone-in-aerial-combat-fuelling-debate-on-the-future-of-warfare\/\" class=\"read_more\">\n                                <i class=\"stm-lnr-arrow-right third_bg_color base_bg_color_hv\"><\/i>\n                                <span>\n                                Read more                                <\/span>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                <\/li>\n\n            \n                                <li class=\"view_style_3\">\n                    <div class=\"post_item\">\n                                                    <a href=\"https:\/\/equinoxgroup.eu\/the-human-factor-in-ai-double-edged-sword\/\" class=\"image\">\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2023\/05\/Geoffrey-Hinton-260x170.jpg\" width=\"260\" height=\"170\" alt=\"Geoffrey Hinton\" title=\"Geoffrey Hinton\" loading=\"lazy\" \/>                            <\/a>\n                                                <div class=\"content\">\n                            <a href=\"https:\/\/equinoxgroup.eu\/the-human-factor-in-ai-double-edged-sword\/\" class=\"title base_font_color\">\n                                <h5 class=\"secondary_font_color_hv\">The Human Factor in AI: A Double-Edged Sword<\/h5>\n                            <\/a>\n                            <div class=\"description\">\n                                                            <\/div>\n                            <a href=\"https:\/\/equinoxgroup.eu\/the-human-factor-in-ai-double-edged-sword\/\" class=\"read_more\">\n                                <i class=\"stm-lnr-arrow-right third_bg_color base_bg_color_hv\"><\/i>\n                                <span>\n                                Read more                                <\/span>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                <\/li>\n\n            \n                                <li class=\"view_style_3\">\n                    <div class=\"post_item\">\n                                                    <a href=\"https:\/\/equinoxgroup.eu\/overcoming-data-limitations-for-ai-models-the-future-of-machine-learning-approaches\/\" class=\"image\">\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2023\/05\/Data-Limitations-AI-260x170.jpg\" width=\"260\" height=\"170\" alt=\"Data Limitations AI\" title=\"Data Limitations AI\" loading=\"lazy\" \/>                            <\/a>\n                                                <div class=\"content\">\n                            <a href=\"https:\/\/equinoxgroup.eu\/overcoming-data-limitations-for-ai-models-the-future-of-machine-learning-approaches\/\" class=\"title base_font_color\">\n                                <h5 class=\"secondary_font_color_hv\">Overcoming Data Limitations for AI Models: The Future of Machine Learning Approaches<\/h5>\n                            <\/a>\n                            <div class=\"description\">\n                                                            <\/div>\n                            <a href=\"https:\/\/equinoxgroup.eu\/overcoming-data-limitations-for-ai-models-the-future-of-machine-learning-approaches\/\" class=\"read_more\">\n                                <i class=\"stm-lnr-arrow-right third_bg_color base_bg_color_hv\"><\/i>\n                                <span>\n                                Read more                                <\/span>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                <\/li>\n\n                    <\/ul>\n    <\/div>\n<div class=\"vc_empty_space\"   style=\"height: 48px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1667116849933\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_btn3-container vc_btn3-inline vc_do_btn\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary\" href=\"https:\/\/equinoxgroup.eu\/news\" title=\"\">See All News Items<\/a><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 48px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\t<div class=\"vc_separator wpb_content_element vc_sep_width_100 vc_sep_border_width_3 type_1  vc_separator_no_text\">\n\t\t<span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#fde952;\" class=\"vc_sep_line\"><\/span><\/span>\n\t\t\t\t<span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#fde952;\" class=\"vc_sep_line\"><\/span><\/span>\n\t<\/div>\n\t\n<div class=\"vc_empty_space\"   style=\"height: 48px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_custom_heading vc_custom_1713917315239 text_align_left has_icon\" ><div class=\"icon\" style=\"font-size: 36px; line-height: 36px;\"><i class=\"fas fa-key\"><\/i><\/div><h2 style=\"font-size: 30px;text-align: left\" class=\"consulting-custom-title\">Article Keywords<\/h2><\/div><div class=\"vc_empty_space\"   style=\"height: 24px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"post_bottom_wr \">\n    <div class=\"post_bottom media\">\n\t<div class=\"tags media-body\"><a href=\"https:\/\/equinoxgroup.eu\/tag\/ai\/\" rel=\"tag\">AI<\/a> <a href=\"https:\/\/equinoxgroup.eu\/tag\/data-limitations\/\" rel=\"tag\">data limitations<\/a> <a href=\"https:\/\/equinoxgroup.eu\/tag\/machine-learning-approaches\/\" rel=\"tag\">machine learning approaches<\/a><\/div>\t<\/div><\/div><div class=\"about_author_wr \">\n    <\/div>\t<div class=\"vc_separator wpb_content_element vc_sep_width_100 vc_sep_border_width_3 type_1  vc_separator_no_text\">\n\t\t<span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#fde952;\" class=\"vc_sep_line\"><\/span><\/span>\n\t\t\t\t<span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#fde952;\" class=\"vc_sep_line\"><\/span><\/span>\n\t<\/div>\n\t\n    <div class=\"stm_post_comments\">\n            <\/div>\n<\/div><\/div><\/div><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;]<div class=\"ult_row_spacer\"><div class=\"ult-sticky-anchor\"><div class=\"ult-sticky-section ult-sticky \"  data-gutter= '-20' data-stick_behaviour= 'stick_with_scroll_row'  data-sticky_position= 'top' data-mobile='no' data-support='no'><\/div><div class=\"ult-space\"><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1459505959648{margin-bottom: -60px !important;}&#8221; el_class=&#8221;third_bg_color&#8221;][vc_column][vc_cta h2=&#8221;Looking for help with cybersecurity?&#8221; h2_font_container=&#8221;tag:h2|font_size:20|text_align:left&#8221; h2_use_theme_fonts=&#8221;yes&#8221; shape=&#8221;square&#8221; style=&#8221;flat&#8221; add_button=&#8221;right&#8221; btn_title=&#8221;speak to us&#8221; btn_style=&#8221;flat&#8221; btn_color=&#8221;theme_style_2&#8243; btn_align=&#8221;right&#8221; btn_i_align=&#8221;right&#8221; btn_i_icon_fontawesome=&#8221;far fa-comments&#8221; particles=&#8221;yes&#8221; use_custom_fonts_h2=&#8221;true&#8221; btn_add_icon=&#8221;true&#8221; btn_link=&#8221;url:http%3A%2F%2Fequinoxgroup.eu%2Fcontact-us%2F|title:speak%20to%20us&#8221; css=&#8221;.vc_custom_1626820975422{margin-bottom: 0px !important;}&#8221; el_class=&#8221;third_bg_color&#8221;][\/vc_cta][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"Potential data limitations (in the form of scarcity) for AI models is around the corner and alternative machine learning approaches to sustain performance are becoming essential. From redefining data quality, to methods like JEPA, data augmentation and transfer learning, our future with AI holds promising solutions. The limitations of scaling AI and the importance of","protected":false},"author":1,"featured_media":4320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[220,263,400,354,355,265],"insights_perspectives":[],"class_list":{"0":"post-4315","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-algorithmic-brain","8":"tag-cybersecurity","9":"tag-quantum-computing","10":"tag-quantum-cryptography","11":"tag-quantum-key","12":"tag-quantum-key-distribution","13":"tag-telecoms"},"yoast_head":"\n<title>Quantum Communication and Quantum Key Distribution - equinoxgroup.eu<\/title>\n<meta name=\"description\" content=\"the National University of Singapore developed 2 methods to make sure that Quantum Key Distribution communications are safe from attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Communication and Quantum Key Distribution\" \/>\n<meta property=\"og:description\" content=\"the National University of Singapore developed 2 methods to make sure that Quantum Key Distribution communications are safe from attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/\" \/>\n<meta property=\"og:site_name\" content=\"equinoxgroup.eu\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EquinoxGroupMalta\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/bernard.mallia\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T22:15:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-10T00:15:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bernard Mallia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/BernardMallia\" \/>\n<meta name=\"twitter:site\" content=\"@equinox_group\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bernard Mallia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ReportageNewsArticle\",\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/\"},\"author\":{\"name\":\"Bernard Mallia\",\"@id\":\"https:\/\/equinoxgroup.eu\/#\/schema\/person\/d064b4896bdf813365507c3573e1c735\"},\"headline\":\"Quantum Communication and Quantum Key Distribution\",\"datePublished\":\"2021-07-20T22:15:52+00:00\",\"dateModified\":\"2022-11-10T00:15:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/\"},\"wordCount\":1429,\"publisher\":{\"@id\":\"https:\/\/equinoxgroup.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg\",\"keywords\":[\"Cybersecurity\",\"Quantum Computing\",\"quantum cryptography\",\"Quantum key\",\"Quantum key distribution\",\"telecoms\"],\"articleSection\":[\"Algorithmic Brain\"],\"inLanguage\":\"en-GB\",\"copyrightYear\":\"2022\",\"copyrightHolder\":{\"@id\":\"https:\/\/equinoxgroup.eu\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/\",\"url\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/\",\"name\":\"Quantum Communication and Quantum Key Distribution - equinoxgroup.eu\",\"isPartOf\":{\"@id\":\"https:\/\/equinoxgroup.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg\",\"datePublished\":\"2021-07-20T22:15:52+00:00\",\"dateModified\":\"2022-11-10T00:15:43+00:00\",\"description\":\"the National University of Singapore developed 2 methods to make sure that Quantum Key Distribution communications are safe from attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage\",\"url\":\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg\",\"contentUrl\":\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg\",\"width\":1200,\"height\":675,\"caption\":\"Quantum Cryptography\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/equinoxgroup.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum Communication and Quantum Key Distribution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/equinoxgroup.eu\/#website\",\"url\":\"https:\/\/equinoxgroup.eu\/\",\"name\":\"equinoxgroup.eu\",\"description\":\"Equinox Group\",\"publisher\":{\"@id\":\"https:\/\/equinoxgroup.eu\/#organization\"},\"alternateName\":\"Equinox Group\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/equinoxgroup.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/equinoxgroup.eu\/#organization\",\"name\":\"Equinox Group\",\"alternateName\":\"Equinox\",\"url\":\"https:\/\/equinoxgroup.eu\/\",\"logo\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-organization-logo\"},\"sameAs\":[\"https:\/\/www.facebook.com\/EquinoxGroupMalta\",\"https:\/\/x.com\/equinox_group\",\"https:\/\/www.linkedin.com\/groups\/9010639\/\"],\"address\":{\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"35.91732299444383\",\"longitude\":\"14.49995422728913\"},\"telephone\":[\"+35699800001\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"10:00\",\"closes\":\"19:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@equinoxadvisory.com\",\"areaServed\":\"EU, USA, Middle East, Africa, Asia\",\"vatID\":\"MT 21316028\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/equinoxgroup.eu\/#\/schema\/person\/d064b4896bdf813365507c3573e1c735\",\"name\":\"Bernard Mallia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/equinoxgroup.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9f7782f39c6906e28fd98c397dc1f29be402dedd353fd82192af03461fc04cc7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9f7782f39c6906e28fd98c397dc1f29be402dedd353fd82192af03461fc04cc7?s=96&d=mm&r=g\",\"caption\":\"Bernard Mallia\"},\"sameAs\":[\"http:\/\/equinoxgroup.eu\",\"https:\/\/www.facebook.com\/bernard.mallia\",\"https:\/\/www.linkedin.com\/in\/bernardmallia\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/BernardMallia\"],\"url\":\"https:\/\/equinoxgroup.eu\/author\/wpx_bm_grp_admin\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-place-address\",\"streetAddress\":\"Suite 1, 208,, Tower Road\",\"addressLocality\":\"Sliema\",\"postalCode\":\"SLM 1602\",\"addressCountry\":\"MT\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-organization-logo\",\"url\":\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/06\/Equinox-Group-Black.png\",\"contentUrl\":\"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/06\/Equinox-Group-Black.png\",\"width\":425,\"height\":140,\"caption\":\"Equinox Group\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Sliema\" \/>\n<meta name=\"geo.position\" content=\"35.91732299444383;14.49995422728913\" \/>\n<meta name=\"geo.region\" content=\"Malta\" \/>\n","yoast_head_json":{"title":"Quantum Communication and Quantum Key Distribution - equinoxgroup.eu","description":"the National University of Singapore developed 2 methods to make sure that Quantum Key Distribution communications are safe from attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/","og_locale":"en_GB","og_type":"article","og_title":"Quantum Communication and Quantum Key Distribution","og_description":"the National University of Singapore developed 2 methods to make sure that Quantum Key Distribution communications are safe from attack.","og_url":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/","og_site_name":"equinoxgroup.eu","article_publisher":"https:\/\/www.facebook.com\/EquinoxGroupMalta","article_author":"https:\/\/www.facebook.com\/bernard.mallia","article_published_time":"2021-07-20T22:15:52+00:00","article_modified_time":"2022-11-10T00:15:43+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg","type":"image\/jpeg"}],"author":"Bernard Mallia","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/BernardMallia","twitter_site":"@equinox_group","twitter_misc":{"Written by":"Bernard Mallia","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ReportageNewsArticle","@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#article","isPartOf":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/"},"author":{"name":"Bernard Mallia","@id":"https:\/\/equinoxgroup.eu\/#\/schema\/person\/d064b4896bdf813365507c3573e1c735"},"headline":"Quantum Communication and Quantum Key Distribution","datePublished":"2021-07-20T22:15:52+00:00","dateModified":"2022-11-10T00:15:43+00:00","mainEntityOfPage":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/"},"wordCount":1429,"publisher":{"@id":"https:\/\/equinoxgroup.eu\/#organization"},"image":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage"},"thumbnailUrl":"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg","keywords":["Cybersecurity","Quantum Computing","quantum cryptography","Quantum key","Quantum key distribution","telecoms"],"articleSection":["Algorithmic Brain"],"inLanguage":"en-GB","copyrightYear":"2022","copyrightHolder":{"@id":"https:\/\/equinoxgroup.eu\/#organization"}},{"@type":"WebPage","@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/","url":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/","name":"Quantum Communication and Quantum Key Distribution - equinoxgroup.eu","isPartOf":{"@id":"https:\/\/equinoxgroup.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage"},"image":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage"},"thumbnailUrl":"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg","datePublished":"2021-07-20T22:15:52+00:00","dateModified":"2022-11-10T00:15:43+00:00","description":"the National University of Singapore developed 2 methods to make sure that Quantum Key Distribution communications are safe from attack.","breadcrumb":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#primaryimage","url":"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg","contentUrl":"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/07\/Quantum-Cryptography.jpg","width":1200,"height":675,"caption":"Quantum Cryptography"},{"@type":"BreadcrumbList","@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/equinoxgroup.eu\/"},{"@type":"ListItem","position":2,"name":"Quantum Communication and Quantum Key Distribution"}]},{"@type":"WebSite","@id":"https:\/\/equinoxgroup.eu\/#website","url":"https:\/\/equinoxgroup.eu\/","name":"equinoxgroup.eu","description":"Equinox Group","publisher":{"@id":"https:\/\/equinoxgroup.eu\/#organization"},"alternateName":"Equinox Group","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/equinoxgroup.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Organization","Place"],"@id":"https:\/\/equinoxgroup.eu\/#organization","name":"Equinox Group","alternateName":"Equinox","url":"https:\/\/equinoxgroup.eu\/","logo":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-organization-logo"},"image":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/EquinoxGroupMalta","https:\/\/x.com\/equinox_group","https:\/\/www.linkedin.com\/groups\/9010639\/"],"address":{"@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"35.91732299444383","longitude":"14.49995422728913"},"telephone":["+35699800001"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"10:00","closes":"19:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@equinoxadvisory.com","areaServed":"EU, USA, Middle East, Africa, Asia","vatID":"MT 21316028"},{"@type":"Person","@id":"https:\/\/equinoxgroup.eu\/#\/schema\/person\/d064b4896bdf813365507c3573e1c735","name":"Bernard Mallia","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/equinoxgroup.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9f7782f39c6906e28fd98c397dc1f29be402dedd353fd82192af03461fc04cc7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f7782f39c6906e28fd98c397dc1f29be402dedd353fd82192af03461fc04cc7?s=96&d=mm&r=g","caption":"Bernard Mallia"},"sameAs":["http:\/\/equinoxgroup.eu","https:\/\/www.facebook.com\/bernard.mallia","https:\/\/www.linkedin.com\/in\/bernardmallia\/","https:\/\/x.com\/https:\/\/twitter.com\/BernardMallia"],"url":"https:\/\/equinoxgroup.eu\/author\/wpx_bm_grp_admin\/"},{"@type":"PostalAddress","@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-place-address","streetAddress":"Suite 1, 208,, Tower Road","addressLocality":"Sliema","postalCode":"SLM 1602","addressCountry":"MT"},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/equinoxgroup.eu\/researchers-create-attack-proof-quantum-communication\/#local-main-organization-logo","url":"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/06\/Equinox-Group-Black.png","contentUrl":"https:\/\/equinoxgroup.eu\/wp-content\/uploads\/2021\/06\/Equinox-Group-Black.png","width":425,"height":140,"caption":"Equinox Group"}]},"geo.placename":"Sliema","geo.position":{"lat":"35.91732299444383","long":"14.49995422728913"},"geo.region":"Malta"},"_links":{"self":[{"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/posts\/4315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/comments?post=4315"}],"version-history":[{"count":0,"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/posts\/4315\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/media\/4320"}],"wp:attachment":[{"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/media?parent=4315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/categories?post=4315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/tags?post=4315"},{"taxonomy":"insights_perspectives","embeddable":true,"href":"https:\/\/equinoxgroup.eu\/apps-api\/wp\/v2\/insights_perspectives?post=4315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}