SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
The 'unjammable' quantum radar that could
render ALL stealth planes useless
U.S. researchers have employed the quantum properties of photons to create an unjammable
radar signal.

Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to
create false reflections to drowning the radar frequency with noise.

More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are
able to intercept the the signals and send back false information.




A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of
radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft
systems

However, a team from the University of Rochester, New York have shown how the quantum
properties of photons can be used to outsmart this advanced stealth technology.

The new radar concept relies on the fact that any attempt to measure a photon always destroys its
quantum properties, MIT's Technology Review explains.
Physicists have exploited the quantum properties of photons to create the first imaging system
that is unjammable




Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and
resend them in a way that disguises its position, it would inevitably change the photons' quantum
properties




Jamming radar signals is an increasingly sophisticated affair. There are various techniques such
as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the
most advanced radar systems can get around these ruses.

So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives
false information about the target before sending it back. That’s much harder to outsmart.

But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a
way to do it.

These guys base their technique on the quantum properties of photons and in particular on the
fact that any attempt to measure a photon always destroys its quantum properties.

So their idea is to use polarised photons to detect and image objects. Reflected photons can of
course be used to build up an image of the object. But an adversary could intercept these photons
and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
However, such a process would always change the quantum properties of the photons such as
their polarisation. And so it should always be possible to detect such interference. “In order to
jam our imaging system, the object must disturb the delicate quantum state of the imaging
photons, thus introducing statistical errors that reveal its activity,” say Malik and co.

That’s more or less exactly how quantum key distribution for cryptography works. The idea here
is that any eavesdropper would change the quantum properties of the key and so reveal his or her
presence. The only difference in the quantum imaging scenario is that the “message” is sent and
received by the same person.

Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and
measuring the polarisation error rate in the return signal. Without any eavesdropping the system
easily imaged the aeroplane.

But when an adversary intercepted the photons and modified them to send back an image of a
bird, the interference was easy to spot, say Malik and co.

That’s an impressive demonstration of the first imaging system that is unjammable thanks to
quantum mechanics.

That’s not to say the technique is perfect. It suffers from the same limitations that plague early
quantum cryptographic systems, which are theoretically secure but crackable in practice.

For example, instead of sending single photons, the quantum imaging system sends photon
pulses which contain several photons. One or more of these can easily be siphoned away and
analysed by an adversary without anybody else being any the wiser.

However, there are an increasingly wide range of fixes for these problems for quantum key
distribution that could help make this quantum imaging system more secure.

Perhaps best of all, this kind of system could easily be put to work now. The techniques are well
known and widely used in optics labs all over the world. So there’s no reason, this security
cannot be added relatively quickly and cheaply to existing imaging systems.

Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging

The technology works in a similar way to quantum key distribution for cryptography, where any
eavesdropper would change the quantum properties of the key by listening in, revealing his or
her presence.

Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics,
tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the
return signal's polarisation error rate.
The system easily imaged the war plane without any eavesdropping, but when the adversary
intercepted the signal and modified it to send back the image of a bird, the radar was easily able
to see through the ruse.




No fooling us: When there is no jamming attack, the received image faithfully reproduces the
actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right,
the imaging system can detect the presence of the jamming attack, because of the large error rate
in the received polarization

However, the researchers admit that their novel radar system is still not perfect. As MIT's
blogger explains, it suffers from the same limitations that plagued early quantum cryptographic
systems.

The quantum radar sends photons in pulses that contain several of the quantum particles, one or
more of which could be easily siphoned away and replicated to tune the signal sent back to the
same state as the one sent.

'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state
of our querying photons onto photons carrying false position or time information,' says the study.

However, while the equipment needed to carry out such sophisticated jamming is readily
available in labs worldwide, it is not thought yet to be deployed by the military.

Contenu connexe

Tendances

Tendances (20)

Laser cooling & trapping
Laser cooling & trappingLaser cooling & trapping
Laser cooling & trapping
 
Applications of Quantum Entanglement Presentation
Applications of Quantum Entanglement PresentationApplications of Quantum Entanglement Presentation
Applications of Quantum Entanglement Presentation
 
CM [014] The Phonon
CM [014] The PhononCM [014] The Phonon
CM [014] The Phonon
 
Metamaterials
MetamaterialsMetamaterials
Metamaterials
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglement
 
Quantum computation with superconductors
Quantum computation with superconductorsQuantum computation with superconductors
Quantum computation with superconductors
 
QED: Quantum Electrodynamics
QED: Quantum ElectrodynamicsQED: Quantum Electrodynamics
QED: Quantum Electrodynamics
 
Optical Instrumentation 9. Interferometer
Optical Instrumentation   9. InterferometerOptical Instrumentation   9. Interferometer
Optical Instrumentation 9. Interferometer
 
LORENTZ TRANSFORMATION
LORENTZ TRANSFORMATIONLORENTZ TRANSFORMATION
LORENTZ TRANSFORMATION
 
Spintronics ppt
Spintronics pptSpintronics ppt
Spintronics ppt
 
Unit 6
Unit 6Unit 6
Unit 6
 
Electromagnetic spectrum
Electromagnetic spectrumElectromagnetic spectrum
Electromagnetic spectrum
 
Double-Slit interference
Double-Slit interferenceDouble-Slit interference
Double-Slit interference
 
Spin of electron and proton
Spin of electron and protonSpin of electron and proton
Spin of electron and proton
 
Single photon sources and detectors
Single photon sources and detectorsSingle photon sources and detectors
Single photon sources and detectors
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
 
GAMMA-RAY SPECTROSCOPY
GAMMA-RAY SPECTROSCOPYGAMMA-RAY SPECTROSCOPY
GAMMA-RAY SPECTROSCOPY
 
Diffraction
Diffraction Diffraction
Diffraction
 
Laser lecture 01
Laser lecture 01Laser lecture 01
Laser lecture 01
 
Spacecraft charging
Spacecraft chargingSpacecraft charging
Spacecraft charging
 

En vedette

Stealth technology
Stealth technologyStealth technology
Stealth technologynitin7365
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technologyamtul muneeb
 
A Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewA Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewHasan Ege
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology pptHanim MS
 
Network Effects
Network EffectsNetwork Effects
Network Effectsa16z
 

En vedette (8)

Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technology
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
stealth technology
stealth technologystealth technology
stealth technology
 
A Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewA Lotof Much Many A Little A Few
A Lotof Much Many A Little A Few
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology ppt
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 

Similaire à Quantum radar could render stealth planes 'unjammable

AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsAI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsIRJET Journal
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldHome
 
上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱algous
 
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...csandit
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsTahoe Silicon Mountain
 
Artificial intelligence in space exploration venkat vajradhar - medium
Artificial intelligence in space exploration   venkat vajradhar - mediumArtificial intelligence in space exploration   venkat vajradhar - medium
Artificial intelligence in space exploration venkat vajradhar - mediumvenkatvajradhar1
 
Quantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBQuantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBNusrat Mary
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentationClifford Stone
 
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsIRJET Journal
 
MRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxMRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxRohit Bansal
 
Quantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesQuantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesOrchidea Maria Lecian
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersDr. Ali Nassib
 
Quantum computing
Quantum computingQuantum computing
Quantum computingJulien33x
 

Similaire à Quantum radar could render stealth planes 'unjammable (20)

AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsAI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
 
Ai covers space
Ai covers spaceAi covers space
Ai covers space
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the world
 
上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱
 
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
 
November 30, Projects
November 30, ProjectsNovember 30, Projects
November 30, Projects
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
 
Artificial intelligence in space exploration venkat vajradhar - medium
Artificial intelligence in space exploration   venkat vajradhar - mediumArtificial intelligence in space exploration   venkat vajradhar - medium
Artificial intelligence in space exploration venkat vajradhar - medium
 
Quantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBQuantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUB
 
Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09
 
Jermaine Taylor Presentation
Jermaine Taylor PresentationJermaine Taylor Presentation
Jermaine Taylor Presentation
 
1047 bae[1]
1047 bae[1]1047 bae[1]
1047 bae[1]
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentation
 
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
 
MRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxMRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptx
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Quantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesQuantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems ones
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_Posters
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Plus de Mustakeem Chaudhri

Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Mustakeem Chaudhri
 
The great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaThe great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaMustakeem Chaudhri
 
Meet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMeet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMustakeem Chaudhri
 
Richest monarchs and royals of the world
Richest monarchs and royals of the worldRichest monarchs and royals of the world
Richest monarchs and royals of the worldMustakeem Chaudhri
 
Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyMustakeem Chaudhri
 
Two underground nwo bases destroyed
Two underground nwo bases destroyedTwo underground nwo bases destroyed
Two underground nwo bases destroyedMustakeem Chaudhri
 
The illuminati explained rothschild family
The illuminati explained rothschild familyThe illuminati explained rothschild family
The illuminati explained rothschild familyMustakeem Chaudhri
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaultsMustakeem Chaudhri
 
Thirty little known facts about america
Thirty little known facts about americaThirty little known facts about america
Thirty little known facts about americaMustakeem Chaudhri
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldMustakeem Chaudhri
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)Mustakeem Chaudhri
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistanMustakeem Chaudhri
 
Secrets illuminism in the ozarks
Secrets illuminism in the ozarksSecrets illuminism in the ozarks
Secrets illuminism in the ozarksMustakeem Chaudhri
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Mustakeem Chaudhri
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...Mustakeem Chaudhri
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMustakeem Chaudhri
 

Plus de Mustakeem Chaudhri (20)

Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson
 
13 satanic bloodlines
13 satanic bloodlines13 satanic bloodlines
13 satanic bloodlines
 
The great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaThe great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying america
 
Doomsday seed vault
Doomsday seed vaultDoomsday seed vault
Doomsday seed vault
 
Meet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMeet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynasty
 
Jews origin (Rothschild)
Jews origin (Rothschild)Jews origin (Rothschild)
Jews origin (Rothschild)
 
Richest monarchs and royals of the world
Richest monarchs and royals of the worldRichest monarchs and royals of the world
Richest monarchs and royals of the world
 
Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecy
 
Two underground nwo bases destroyed
Two underground nwo bases destroyedTwo underground nwo bases destroyed
Two underground nwo bases destroyed
 
The illuminati explained rothschild family
The illuminati explained rothschild familyThe illuminati explained rothschild family
The illuminati explained rothschild family
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaults
 
Thirty little known facts about america
Thirty little known facts about americaThirty little known facts about america
Thirty little known facts about america
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the world
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan
 
Secrets illuminism in the ozarks
Secrets illuminism in the ozarksSecrets illuminism in the ozarks
Secrets illuminism in the ozarks
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all time
 
Israel has nuclear weapons
Israel has nuclear weaponsIsrael has nuclear weapons
Israel has nuclear weapons
 

Dernier

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Quantum radar could render stealth planes 'unjammable

  • 1. The 'unjammable' quantum radar that could render ALL stealth planes useless U.S. researchers have employed the quantum properties of photons to create an unjammable radar signal. Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to create false reflections to drowning the radar frequency with noise. More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are able to intercept the the signals and send back false information. A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft systems However, a team from the University of Rochester, New York have shown how the quantum properties of photons can be used to outsmart this advanced stealth technology. The new radar concept relies on the fact that any attempt to measure a photon always destroys its quantum properties, MIT's Technology Review explains.
  • 2. Physicists have exploited the quantum properties of photons to create the first imaging system that is unjammable Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and resend them in a way that disguises its position, it would inevitably change the photons' quantum properties Jamming radar signals is an increasingly sophisticated affair. There are various techniques such as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the most advanced radar systems can get around these ruses. So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives false information about the target before sending it back. That’s much harder to outsmart. But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a way to do it. These guys base their technique on the quantum properties of photons and in particular on the fact that any attempt to measure a photon always destroys its quantum properties. So their idea is to use polarised photons to detect and image objects. Reflected photons can of course be used to build up an image of the object. But an adversary could intercept these photons and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
  • 3. However, such a process would always change the quantum properties of the photons such as their polarisation. And so it should always be possible to detect such interference. “In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity,” say Malik and co. That’s more or less exactly how quantum key distribution for cryptography works. The idea here is that any eavesdropper would change the quantum properties of the key and so reveal his or her presence. The only difference in the quantum imaging scenario is that the “message” is sent and received by the same person. Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and measuring the polarisation error rate in the return signal. Without any eavesdropping the system easily imaged the aeroplane. But when an adversary intercepted the photons and modified them to send back an image of a bird, the interference was easy to spot, say Malik and co. That’s an impressive demonstration of the first imaging system that is unjammable thanks to quantum mechanics. That’s not to say the technique is perfect. It suffers from the same limitations that plague early quantum cryptographic systems, which are theoretically secure but crackable in practice. For example, instead of sending single photons, the quantum imaging system sends photon pulses which contain several photons. One or more of these can easily be siphoned away and analysed by an adversary without anybody else being any the wiser. However, there are an increasingly wide range of fixes for these problems for quantum key distribution that could help make this quantum imaging system more secure. Perhaps best of all, this kind of system could easily be put to work now. The techniques are well known and widely used in optics labs all over the world. So there’s no reason, this security cannot be added relatively quickly and cheaply to existing imaging systems. Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging The technology works in a similar way to quantum key distribution for cryptography, where any eavesdropper would change the quantum properties of the key by listening in, revealing his or her presence. Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics, tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the return signal's polarisation error rate.
  • 4. The system easily imaged the war plane without any eavesdropping, but when the adversary intercepted the signal and modified it to send back the image of a bird, the radar was easily able to see through the ruse. No fooling us: When there is no jamming attack, the received image faithfully reproduces the actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right, the imaging system can detect the presence of the jamming attack, because of the large error rate in the received polarization However, the researchers admit that their novel radar system is still not perfect. As MIT's blogger explains, it suffers from the same limitations that plagued early quantum cryptographic systems. The quantum radar sends photons in pulses that contain several of the quantum particles, one or more of which could be easily siphoned away and replicated to tune the signal sent back to the same state as the one sent. 'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state of our querying photons onto photons carrying false position or time information,' says the study. However, while the equipment needed to carry out such sophisticated jamming is readily available in labs worldwide, it is not thought yet to be deployed by the military.