Quantum Physics का ऐसा ताला जिसको कोई नहीं खोल सकता Quantum Cryptography | Quantum Key Distribution
Open your Demat Account with Motilal Oswal - Link https://www.motilaloswal.com/campaign/Registrationoffers/Page242/SEM_Campaign135.html?utm_source=sciencea...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Vietnam under the topic 'ket qua c2'.
About this video
Open your Demat Account with Motilal Oswal - Link
https://www.motilaloswal.com/campaign/Registrationoffers/Page242/SEM_Campaign135.html?utm_source=scienceandmyths&utm_medium=topinfluencers&utm_term=may21
https://play.google.com/store/apps/details?id=com.mosl.mobile
https://apps.apple.com/in/app/mo-investor/id1055577451
Quantum cryptography sounds fairly complex – probably because it is. That’s why we put together this “encryption guide for dummies” as a way of explaining what quantum cryptography is and taking some of the complexity out of it.
Although the subject has been around for a couple of decades, quantum cryptography (not to be confused with post-quantum cryptography) is quickly becoming more critically relevant to our everyday lives because of how it can safeguard vital data in a way that current encryption methods can’t.
Consider, for example, the trust you place in banks and commercial enterprises to keep your credit card and other information safe while conducting business transactions online. What if those companies – using current encryption methods – could no longer guarantee the security of your private information? Granted, cybercriminals are always trying to gain access to secure data, but when quantum computers come online, that information will be even more vulnerable to being hacked. In fact, hackers don’t even need to wait for quantum computers to start the process because they’re collecting encrypted data now to decrypt later when the quantum computers are ready. With quantum encryption, that’s not the case because your information will be unhackable. Let’s explain.
Cryptography is the process of encrypting data, or converting plain text into scrambled text so that only someone who has the right “key” can read it. Quantum cryptography, by extension, simply uses the principles of quantum mechanics to encrypt data and transmit it in a way that cannot be hacked.
While the definition sounds simple, the complexity lies in the principles of quantum mechanics behind quantum cryptography, such as:
The particles that make up the universe are inherently uncertain and can simultaneously exist in more than one place or more than one state of being.
Photons are generated randomly in one of two quantum states.
You can’t measure a quantum property without changing or disturbing it.
You can clone some quantum properties of a particle, but not the whole particle.
All these principles play a role in how quantum cryptography works.
Quantum cryptography, or quantum key distribution (QKD), uses a series of photons (light particles) to transmit data from one location to another over a fiber optic cable. By comparing measurements of the properties of a fraction of these photons, the two endpoints can determine what the key is and if it is safe to use.
Breaking the process down further helps to explain it better.
The sender transmits photons through a filter (or polarizer) which randomly gives them one of four possible polarizations and bit designations: Vertical (One bit), Horizontal (Zero bit), 45 degree right (One bit), or 45 degree left (Zero bit).
The photons travel to a receiver, which uses two beam splitters (horizontal/vertical and diagonal) to “read” the polarization of each photon. The receiver does not know which beam splitter to use for each photon and has to guess which one to use.
Once the stream of photons has been sent, the receiver tells the sender which beam splitter was used for each of the photons in the sequence they were sent, and the sender compares that information with the sequence of polarizers used to send the key. The photons that were read using the wrong beam splitter are discarded, and the resulting sequence of bits becomes the key.
If the photon is read or copied in any way by an eavesdropper, the photon’s state will change. The change will be detected by the endpoints. In other words, this means you cannot read the photon and forward it on or make a copy of it without being detected.
To know more watch out this full video.
Thanks for watching..
Social accounts link
https://www.instagram.com/scienceandmyths/
Facebook Page- https://www.facebook.com/ScienceAndMyths/
FAIR-USE COPYRIGHT DISCLAIMER This video is meant for Educational/Inspirational purpose only. We do not own any copyrights, all the rights go to their respective owners. The sole purpose of this video is to inspire, empower and educate the viewers.
https://play.google.com/store/apps/details?id=com.mosl.mobile
https://apps.apple.com/in/app/mo-investor/id1055577451
Video Information
Views
170.2K
Total views since publication
Likes
7.3K
User likes and reactions
Duration
27:01
Video length
Published
May 15, 2021
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#quantum cryptography #quantum physics in hindi #einstein vs quantum mechanics #quantum key distribution in hindi #quantum teleportation in hindi #quantum mechanics documentary #science documentary 2021 #space documentary 2021 #bb84 protocol explained #quantum bit #quantum bit hindi #q-bit #quantum superposition #quantum computers hindi #quantum computancy #quantum computing #physical science #quantum cryptography nptel #photoelectric effect #quantum mechanics documentary hindi
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.