{"id":27232,"date":"2014-11-08T08:41:03","date_gmt":"2014-11-08T13:41:03","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27232"},"modified":"2014-11-08T08:41:03","modified_gmt":"2014-11-08T13:41:03","slug":"china-builds-computer-network-impenetrable-to-hackers","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/china-builds-computer-network-impenetrable-to-hackers.php","title":{"rendered":"China builds computer network impenetrable to hackers"},"content":{"rendered":"<p><p>    However, Prof Pan said eventually all communications in China,    down to storing photographs on cloud servers, could feature    quantum encryption.  <\/p>\n<p>    \"Ten years ago it was not so easy to get sufficient funding to    support theoretical research, but since 2006 and 2007 when the    economy really went well, they have been putting more money    into research and then it really sped up,\" he said.  <\/p>\n<p>    Half an hour's drive away from Prof Pan's office, at Quantum    Communications Technology, a company spun out of the university    to commercialise the technology, the importance of the project    is clear. On the walls are framed photographs of visits from    almost all of China's top leaders, including president Xi    Jinping.  <\/p>\n<p>    A huge video screen shows 56 terminals across the city that are    already using quantum encryption. Currently, anyone wanting to    send a secret message over the internet encrypts their    communications so that only someone with the right code at the    other end can unlock it.  <\/p>\n<p>    But the US National Security Agency reportedly has computers    powerful enough to crack encryption codes and is developing a    quantum computer that will be able to run calculations so    quickly that it can easily defeat encryption.  <\/p>\n<p>    That means that, if it is able to tap fibre-optic cables and    copy data travelling down the line, its hackers should be able    to unlock the information.  <\/p>\n<p>    Quantum encryption relies upon writing the encryption codes, or    keys, upon single photons of light (a quantum particle). If a    hacker tries to eavesdrop on the line, they will disturb the    encoding of the photon and be detected. Consequently, said Prof    Pan, it should provide perfect security.  <\/p>\n<p>    \"Of course, although quantum communication can in principle    provide absolute security, in practice, we have to prove it    thoroughly by various hacking tests. So we are inviting the    finest hackers to attack our system,\" he said.  <\/p>\n<p>    \"The Chinese are really pushing the boundaries,\" said Raymond    Laflamme, the head of the Institute for Quantum Computing at    the University of Waterloo in Canada. \"They are moving at an    incredible rate. No one else around the world has plans that    are this ambitious.\"  <\/p>\n<p>    \"China is putting itself in the position of having secure    private information that other countries will not be able to    tap,\" he added.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/telegraph.feedsportal.com\/c\/32726\/f\/568301\/s\/4043cea9\/sc\/21\/l\/0L0Stelegraph0O0Cnews0Cworldnews0Casia0Cchina0C112167660CChina0Ebuilds0Ecomputer0Enetwork0Eimpenetrable0Eto0Ehackers0Bhtml\/story01.htm\/RK=0\/RS=0OHK4Gxt6Avdg98TlgeHNyN4aQk-\" title=\"China builds computer network impenetrable to hackers\">China builds computer network impenetrable to hackers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> However, Prof Pan said eventually all communications in China, down to storing photographs on cloud servers, could feature quantum encryption. \"Ten years ago it was not so easy to get sufficient funding to support theoretical research, but since 2006 and 2007 when the economy really went well, they have been putting more money into research and then it really sped up,\" he said<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27232","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27232"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27232"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27232\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}