send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Claim your free MCQ
Please specify
Sorry for the inconvenience but we’re performing some maintenance at the moment. Website can be slow during this phase..
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
Type your modal answer and submitt for approval
With reference to Quantum Key Distribution (QKD) technology underpinning Quantum Communications, consider the following statements:
1. It enables ultra-fast communication while ensuring unconditional data security by virtue of complex mathematical algorithms.
2. It is limited to communication between objects which are in each other's line-of-sight.
3. It enables two communicating users to detect the presence of any third party trying to break into the communication network.
Which of the statements given above is/are correct?
1 only
1 and 3 only
3 only
1, 2 and 3
? Recent Context: For the first time in the country, the Indian Space Research Organisation (ISRO) has successfully demonstrated free-space Quantum Communication over a distance of 300 m. ? A number of key technologies were developed indigenously to accomplish this major feat, which included the use of indigenously developed NAVIC receiver for time synchronization between the transmitter and receiver modules, and gimbal mechanism systems instead of bulky large-aperture telescopes for optical alignment. ? The demonstration has included live video conferencing using quantum-key-encrypted signals. This is a major milestone achievement for unconditionally secured satellite data communication using quantum technologies. ? The Quantum Key Distribution (QKD) technology underpins Quantum Communication technology that ensures unconditional data security by virtue of the principles of quantum mechanics, which is not possible with conventional encryption systems. The conventional cryptosystems used for data encryption rely on the complexity of mathematical algorithms, whereas the security offered by quantum communication is based on the laws of Physics. Therefore, quantum cryptography is considered ‘future-proof’, since no future advancements in computational power can break the quantum cryptosystem. Hence statement 1 is not correct. ? The free-space QKD was demonstrated at Space Applications Centre (SAC), Ahmedabad, between two line-of-sight buildings within the campus. The experiment was performed at night, in order to ensure that there is no interference from the direct sunlight. The experiment is a major breakthrough towards ISRO’s goal of demonstrating Satellite-Based Quantum Communication (SBQC), where ISRO is gearing up to demonstrate the technology between two Indian ground stations. The communicating objects need not necessarily be in each other's line-of-sight. Hence statement 2 is not correct. The longest QKD network is in China of around a 2000-kilometer ground link between Beijing and Shanghai. ? Quantum communication takes advantage of the laws of quantum physics to protect data. These laws allow particles—typically photons of light for transmitting data along optical cables—to take on a state of superposition, which means they can represent multiple combinations of 1 and 0 simultaneously. The particles are known as quantum bits, or qubits. The significance of qubits from a cybersecurity perspective is that if a hacker tries to observe them in transit, their super-fragile quantum state “collapses” to either 1 or 0. This means a hacker can’t tamper with the qubits without leaving behind a telltale sign of the activity. It enables two communicating users to detect the presence of any third party trying to break into the communication network. Hence statement 3 is correct.
By: Parvesh Mehta ProfileResourcesReport error
Access to prime resources
New Courses