[et_pb_section fb_built=”1″ custom_padding=”0px|0px|0px|0px” fullwidth=”on” _builder_version=”3.0.65″ background_image=”https://www.mdsny.com/wp-content/uploads/2017/08/cat3.jpg” background_size=”contain” background_position=”bottom_center” background_blend=”darken”][et_pb_fullwidth_header title=”Schrödinger’s Cat and Quantum Cryptology” text_orientation=”center” title_font_color=”#ffffff” background_overlay_color=”rgba(0,0,0,0.48)” _builder_version=”3.0.65″ title_font=”Droid Serif||||” title_font_size=”44px”][/et_pb_fullwidth_header][et_pb_fullwidth_header title=”Quantum Cryptology” text_orientation=”center” title_font_color=”#ffffff” background_overlay_color=”rgba(0,0,0,0.48)” _builder_version=”3.0.67″ title_font=”Droid Serif||||” title_font_size=”44px” disabled_on=”off|on|on”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ custom_padding=”12px|0px|0px|0px” _builder_version=”3.0.65″][et_pb_row make_fullwidth=”on” custom_padding=”27px|1px|38px|2px” _builder_version=”3.0.65″][et_pb_column type=”3_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.65″ text_font=”Droid Serif||||” text_font_size=”18px”]

By Michael Fiorito, MDS

Whenever you buy something online, you’re benefiting from the mathematics of encryption.  Can today’s encryption be hacked?    

The short answer is that it is extraordinarily difficult, but not impossible. With enough computing power and skilled mathematicians, hackers can crack today’s math based encryption.

In search of greater security, a new generation of code makers has been turning from math to physics. These cryptologists exploit the laws of quantum mechanics, pioneered by Erwin Schrödinger, to send messages that are provably unhackable.

This new field called is called quantum cryptography.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_image src=”https://www.mdsny.com/wp-content/uploads/2017/08/quantum-2.jpg” _builder_version=”3.0.65″][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#e8e8e8″ custom_padding=”0px|0px|15px|0px” _builder_version=”3.0.65″][et_pb_row make_fullwidth=”on” custom_padding=”38px|0px|26px|0px” _builder_version=”3.0.65″][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.65″ text_font=”Droid Serif||||” text_font_size=”18px” inline_fonts=”Droid Serif”]

Quantum cryptography draws its strength from the weirdness of sub-atomic particles. Sub-atomic particles are able to simultaneously exist in more than one place or more than one state of being at a time. They choose how to behave only when they bump into something else or when we measure their properties.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_fullwidth=”on” custom_padding=”1px|0px|59px|0px” _builder_version=”3.0.65″][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_image src=”https://s-media-cache-ak0.pinimg.com/originals/ea/08/63/ea0863e960dad70f89374fae4cbe9db2.jpg” _builder_version=”3.0.65″][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.65″ text_font=”Droid Serif||||” text_font_size=”18px”]

A quantum key encodes and sends the information needed to decrypt a message in the fuzzy properties of particles, typically light particles. Eavesdroppers trying to steal the key must make measurements of those particles to do so. Because those measurements change the particles’ behavior, they introduce errors that can be detected and alert users that a key has been compromised and should not be used to encode information.

Quantum cryptography therefore makes hacking detectable and consequently more secure.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#8d8c91″ custom_padding=”4px|0px|20px|0px” admin_label=”section” _builder_version=”3.0.65″][et_pb_row make_fullwidth=”on” custom_padding=”10px|0px|27px|0px” admin_label=”row” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_cta title=”Pulling the plug doesn’t have to be your only security solution.” button_url=”https://www.mdsny.com/contact/” button_text=”Contact Us” use_background_color=”off” _builder_version=”3.0.65″ header_font=”Droid Sans|on|||” header_font_size=”31px” body_font=”Droid Sans||||” body_font_size=”19px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_button=”on” button_text_color=”#2d3743″]

Don’t become part of a rising statistic — ensure your company is armed against a security hack.

[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]