SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
The 'unjammable' quantum radar that could
render ALL stealth planes useless
U.S. researchers have employed the quantum properties of photons to create an unjammable
radar signal.

Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to
create false reflections to drowning the radar frequency with noise.

More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are
able to intercept the the signals and send back false information.




A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of
radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft
systems

However, a team from the University of Rochester, New York have shown how the quantum
properties of photons can be used to outsmart this advanced stealth technology.

The new radar concept relies on the fact that any attempt to measure a photon always destroys its
quantum properties, MIT's Technology Review explains.
Physicists have exploited the quantum properties of photons to create the first imaging system
that is unjammable




Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and
resend them in a way that disguises its position, it would inevitably change the photons' quantum
properties




Jamming radar signals is an increasingly sophisticated affair. There are various techniques such
as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the
most advanced radar systems can get around these ruses.

So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives
false information about the target before sending it back. That’s much harder to outsmart.

But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a
way to do it.

These guys base their technique on the quantum properties of photons and in particular on the
fact that any attempt to measure a photon always destroys its quantum properties.

So their idea is to use polarised photons to detect and image objects. Reflected photons can of
course be used to build up an image of the object. But an adversary could intercept these photons
and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
However, such a process would always change the quantum properties of the photons such as
their polarisation. And so it should always be possible to detect such interference. “In order to
jam our imaging system, the object must disturb the delicate quantum state of the imaging
photons, thus introducing statistical errors that reveal its activity,” say Malik and co.

That’s more or less exactly how quantum key distribution for cryptography works. The idea here
is that any eavesdropper would change the quantum properties of the key and so reveal his or her
presence. The only difference in the quantum imaging scenario is that the “message” is sent and
received by the same person.

Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and
measuring the polarisation error rate in the return signal. Without any eavesdropping the system
easily imaged the aeroplane.

But when an adversary intercepted the photons and modified them to send back an image of a
bird, the interference was easy to spot, say Malik and co.

That’s an impressive demonstration of the first imaging system that is unjammable thanks to
quantum mechanics.

That’s not to say the technique is perfect. It suffers from the same limitations that plague early
quantum cryptographic systems, which are theoretically secure but crackable in practice.

For example, instead of sending single photons, the quantum imaging system sends photon
pulses which contain several photons. One or more of these can easily be siphoned away and
analysed by an adversary without anybody else being any the wiser.

However, there are an increasingly wide range of fixes for these problems for quantum key
distribution that could help make this quantum imaging system more secure.

Perhaps best of all, this kind of system could easily be put to work now. The techniques are well
known and widely used in optics labs all over the world. So there’s no reason, this security
cannot be added relatively quickly and cheaply to existing imaging systems.

Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging

The technology works in a similar way to quantum key distribution for cryptography, where any
eavesdropper would change the quantum properties of the key by listening in, revealing his or
her presence.

Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics,
tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the
return signal's polarisation error rate.
The system easily imaged the war plane without any eavesdropping, but when the adversary
intercepted the signal and modified it to send back the image of a bird, the radar was easily able
to see through the ruse.




No fooling us: When there is no jamming attack, the received image faithfully reproduces the
actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right,
the imaging system can detect the presence of the jamming attack, because of the large error rate
in the received polarization

However, the researchers admit that their novel radar system is still not perfect. As MIT's
blogger explains, it suffers from the same limitations that plagued early quantum cryptographic
systems.

The quantum radar sends photons in pulses that contain several of the quantum particles, one or
more of which could be easily siphoned away and replicated to tune the signal sent back to the
same state as the one sent.

'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state
of our querying photons onto photons carrying false position or time information,' says the study.

However, while the equipment needed to carry out such sophisticated jamming is readily
available in labs worldwide, it is not thought yet to be deployed by the military.

Contenu connexe

Tendances

Tendances (20)

Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Stealth technology in aircrafts
Stealth technology in aircraftsStealth technology in aircrafts
Stealth technology in aircrafts
 
Nonlinear optics
Nonlinear opticsNonlinear optics
Nonlinear optics
 
Quantum dot LED (QLED)
Quantum dot LED (QLED)Quantum dot LED (QLED)
Quantum dot LED (QLED)
 
Quantum teleportation
Quantum  teleportationQuantum  teleportation
Quantum teleportation
 
PPT ON GUIDED MISSILES
PPT ON GUIDED MISSILESPPT ON GUIDED MISSILES
PPT ON GUIDED MISSILES
 
CNFET Technology
CNFET TechnologyCNFET Technology
CNFET Technology
 
Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
Microwave Photonics
Microwave PhotonicsMicrowave Photonics
Microwave Photonics
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
Free Electron Laser
Free Electron LaserFree Electron Laser
Free Electron Laser
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Computers.pptx
Quantum Computers.pptxQuantum Computers.pptx
Quantum Computers.pptx
 
Fibre Optics
Fibre OpticsFibre Optics
Fibre Optics
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
 
Quantum gates
Quantum gatesQuantum gates
Quantum gates
 
Institute of photonics presentation
Institute of photonics presentationInstitute of photonics presentation
Institute of photonics presentation
 
Cubesat satellite
Cubesat satelliteCubesat satellite
Cubesat satellite
 
Teleportation
TeleportationTeleportation
Teleportation
 
Stealth technology original
Stealth technology originalStealth technology original
Stealth technology original
 

En vedette

Stealth technology
Stealth technologyStealth technology
Stealth technologynitin7365
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technologyamtul muneeb
 
A Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewA Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewHasan Ege
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology pptHanim MS
 
Network Effects
Network EffectsNetwork Effects
Network Effectsa16z
 

En vedette (8)

Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technology
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
stealth technology
stealth technologystealth technology
stealth technology
 
A Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewA Lotof Much Many A Little A Few
A Lotof Much Many A Little A Few
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology ppt
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 

Similaire à Quantum radar could render stealth planes 'unjammable

AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsAI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsIRJET Journal
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldHome
 
上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱algous
 
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...csandit
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsTahoe Silicon Mountain
 
Artificial intelligence in space exploration venkat vajradhar - medium
Artificial intelligence in space exploration   venkat vajradhar - mediumArtificial intelligence in space exploration   venkat vajradhar - medium
Artificial intelligence in space exploration venkat vajradhar - mediumvenkatvajradhar1
 
Quantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBQuantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBNusrat Mary
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentationClifford Stone
 
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsIRJET Journal
 
MRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxMRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxRohit Bansal
 
Quantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesQuantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesOrchidea Maria Lecian
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersDr. Ali Nassib
 
Quantum computing
Quantum computingQuantum computing
Quantum computingJulien33x
 

Similaire à Quantum radar could render stealth planes 'unjammable (20)

AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsAI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
 
Ai covers space
Ai covers spaceAi covers space
Ai covers space
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the world
 
上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱
 
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
 
November 30, Projects
November 30, ProjectsNovember 30, Projects
November 30, Projects
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
 
Artificial intelligence in space exploration venkat vajradhar - medium
Artificial intelligence in space exploration   venkat vajradhar - mediumArtificial intelligence in space exploration   venkat vajradhar - medium
Artificial intelligence in space exploration venkat vajradhar - medium
 
Quantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBQuantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUB
 
Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09
 
Jermaine Taylor Presentation
Jermaine Taylor PresentationJermaine Taylor Presentation
Jermaine Taylor Presentation
 
1047 bae[1]
1047 bae[1]1047 bae[1]
1047 bae[1]
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentation
 
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
 
MRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxMRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptx
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Quantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesQuantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems ones
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_Posters
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Plus de Mustakeem Chaudhri

Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Mustakeem Chaudhri
 
The great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaThe great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaMustakeem Chaudhri
 
Meet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMeet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMustakeem Chaudhri
 
Richest monarchs and royals of the world
Richest monarchs and royals of the worldRichest monarchs and royals of the world
Richest monarchs and royals of the worldMustakeem Chaudhri
 
Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyMustakeem Chaudhri
 
Two underground nwo bases destroyed
Two underground nwo bases destroyedTwo underground nwo bases destroyed
Two underground nwo bases destroyedMustakeem Chaudhri
 
The illuminati explained rothschild family
The illuminati explained rothschild familyThe illuminati explained rothschild family
The illuminati explained rothschild familyMustakeem Chaudhri
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaultsMustakeem Chaudhri
 
Thirty little known facts about america
Thirty little known facts about americaThirty little known facts about america
Thirty little known facts about americaMustakeem Chaudhri
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldMustakeem Chaudhri
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)Mustakeem Chaudhri
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistanMustakeem Chaudhri
 
Secrets illuminism in the ozarks
Secrets illuminism in the ozarksSecrets illuminism in the ozarks
Secrets illuminism in the ozarksMustakeem Chaudhri
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Mustakeem Chaudhri
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...Mustakeem Chaudhri
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMustakeem Chaudhri
 

Plus de Mustakeem Chaudhri (20)

Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson
 
13 satanic bloodlines
13 satanic bloodlines13 satanic bloodlines
13 satanic bloodlines
 
The great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaThe great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying america
 
Doomsday seed vault
Doomsday seed vaultDoomsday seed vault
Doomsday seed vault
 
Meet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMeet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynasty
 
Jews origin (Rothschild)
Jews origin (Rothschild)Jews origin (Rothschild)
Jews origin (Rothschild)
 
Richest monarchs and royals of the world
Richest monarchs and royals of the worldRichest monarchs and royals of the world
Richest monarchs and royals of the world
 
Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecy
 
Two underground nwo bases destroyed
Two underground nwo bases destroyedTwo underground nwo bases destroyed
Two underground nwo bases destroyed
 
The illuminati explained rothschild family
The illuminati explained rothschild familyThe illuminati explained rothschild family
The illuminati explained rothschild family
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaults
 
Thirty little known facts about america
Thirty little known facts about americaThirty little known facts about america
Thirty little known facts about america
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the world
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan
 
Secrets illuminism in the ozarks
Secrets illuminism in the ozarksSecrets illuminism in the ozarks
Secrets illuminism in the ozarks
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all time
 
Israel has nuclear weapons
Israel has nuclear weaponsIsrael has nuclear weapons
Israel has nuclear weapons
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Quantum radar could render stealth planes 'unjammable

  • 1. The 'unjammable' quantum radar that could render ALL stealth planes useless U.S. researchers have employed the quantum properties of photons to create an unjammable radar signal. Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to create false reflections to drowning the radar frequency with noise. More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are able to intercept the the signals and send back false information. A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft systems However, a team from the University of Rochester, New York have shown how the quantum properties of photons can be used to outsmart this advanced stealth technology. The new radar concept relies on the fact that any attempt to measure a photon always destroys its quantum properties, MIT's Technology Review explains.
  • 2. Physicists have exploited the quantum properties of photons to create the first imaging system that is unjammable Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and resend them in a way that disguises its position, it would inevitably change the photons' quantum properties Jamming radar signals is an increasingly sophisticated affair. There are various techniques such as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the most advanced radar systems can get around these ruses. So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives false information about the target before sending it back. That’s much harder to outsmart. But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a way to do it. These guys base their technique on the quantum properties of photons and in particular on the fact that any attempt to measure a photon always destroys its quantum properties. So their idea is to use polarised photons to detect and image objects. Reflected photons can of course be used to build up an image of the object. But an adversary could intercept these photons and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
  • 3. However, such a process would always change the quantum properties of the photons such as their polarisation. And so it should always be possible to detect such interference. “In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity,” say Malik and co. That’s more or less exactly how quantum key distribution for cryptography works. The idea here is that any eavesdropper would change the quantum properties of the key and so reveal his or her presence. The only difference in the quantum imaging scenario is that the “message” is sent and received by the same person. Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and measuring the polarisation error rate in the return signal. Without any eavesdropping the system easily imaged the aeroplane. But when an adversary intercepted the photons and modified them to send back an image of a bird, the interference was easy to spot, say Malik and co. That’s an impressive demonstration of the first imaging system that is unjammable thanks to quantum mechanics. That’s not to say the technique is perfect. It suffers from the same limitations that plague early quantum cryptographic systems, which are theoretically secure but crackable in practice. For example, instead of sending single photons, the quantum imaging system sends photon pulses which contain several photons. One or more of these can easily be siphoned away and analysed by an adversary without anybody else being any the wiser. However, there are an increasingly wide range of fixes for these problems for quantum key distribution that could help make this quantum imaging system more secure. Perhaps best of all, this kind of system could easily be put to work now. The techniques are well known and widely used in optics labs all over the world. So there’s no reason, this security cannot be added relatively quickly and cheaply to existing imaging systems. Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging The technology works in a similar way to quantum key distribution for cryptography, where any eavesdropper would change the quantum properties of the key by listening in, revealing his or her presence. Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics, tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the return signal's polarisation error rate.
  • 4. The system easily imaged the war plane without any eavesdropping, but when the adversary intercepted the signal and modified it to send back the image of a bird, the radar was easily able to see through the ruse. No fooling us: When there is no jamming attack, the received image faithfully reproduces the actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right, the imaging system can detect the presence of the jamming attack, because of the large error rate in the received polarization However, the researchers admit that their novel radar system is still not perfect. As MIT's blogger explains, it suffers from the same limitations that plagued early quantum cryptographic systems. The quantum radar sends photons in pulses that contain several of the quantum particles, one or more of which could be easily siphoned away and replicated to tune the signal sent back to the same state as the one sent. 'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state of our querying photons onto photons carrying false position or time information,' says the study. However, while the equipment needed to carry out such sophisticated jamming is readily available in labs worldwide, it is not thought yet to be deployed by the military.