Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Quantum Internet and Security of Military Communications

Quantum Internet and Security of Military Communications AbstractIn general, the Internet relies on complex codes to protect information, but hackers are becoming more adept at defeating such systems. These cyberattacks lead to privacy breaches of government officials, as well as large corporations, costing billions of euros per year in total and compromising customer data. According to ENISA reports, these numbers are set to rise. Quantum technology is seen by scientists as a revolutionary replacement for standard encryption techniques. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Land Forces Academy Review de Gruyter

Quantum Internet and Security of Military Communications

Quantum Internet and Security of Military Communications

Land Forces Academy Review Vol. XXVI, No. 4(104), 2021 QUANTUM INTERNET AND SECURITY OF MILITARY COMMUNICATIONS Florin POPESCU “Carol I” National Defense University, Bucharest, Romania popescu.vflorin@unap.ro George BUCĂȚA “Nicolae Bălcescu” Land Forces Academy, Sibiu, Romania george.bucata@yahoo.ro Sorin PISTOL “European Commission” European Asylum Support Office, Brussels, Belgium pistolsorin@icloud.com ABSTRACT In general, the Internet relies on complex codes to protect information, but hackers are becoming more adept at defeating such systems. These cyberattacks lead to privacy breaches of government officials, as well as large corporations, costing billions of euros per year in total and compromising customer data. According to ENISA reports, these numbers are set to rise. Quantum technology is seen by scientists as a revolutionary replacement for standard encryption techniques. KEYWORDS: quantum, security, encryption, atom, photons 1. Introduction on the nature of the atom. For example, It is interesting to observe and Niels Bohr proposed a model of the atom in understand the new scientific paradigms which the electron could only take certain that are changing the evolution of all orbits around the nucleus (Atomic Heritage humanity. In 1911, the first model of the Foundation, 2019). atom was presented and its inconsistency This model of the atom was the first was shown from the point of view of to use quantum theory in the sense that conventional electrodynamics (Science electrons were confined to certain orbits History Institute, 2017). around the nucleus. Bohr used his model to During the same period, Max Planck explain the spectral lines of hydrogen and Niels Bohr published numerous papers (Encyclopaedia Britannica, n.d.). DOI: 10.2478/raft-2021-0038 © 2017. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License. 293 Figure no 1: Bohr model (Source:...
Loading next page...
 
/lp/de-gruyter/quantum-internet-and-security-of-military-communications-Wf6PCGbJC9

References (2)

Publisher
de Gruyter
Copyright
© 2021 Florin Popescu et al., published by Sciendo
eISSN
2247-840X
DOI
10.2478/raft-2021-0038
Publisher site
See Article on Publisher Site

Abstract

AbstractIn general, the Internet relies on complex codes to protect information, but hackers are becoming more adept at defeating such systems. These cyberattacks lead to privacy breaches of government officials, as well as large corporations, costing billions of euros per year in total and compromising customer data. According to ENISA reports, these numbers are set to rise. Quantum technology is seen by scientists as a revolutionary replacement for standard encryption techniques.

Journal

Land Forces Academy Reviewde Gruyter

Published: Dec 1, 2021

Keywords: quantum; security; encryption; atom; photons

There are no references for this article.