The laws of quantum physics allow the photons or light particles to be in a state of superposition i.e., represented in multiple combinations of binary digits (0 and 1) at an instant in time. These combinations are termed qubits .
In classical cryptography, hackers use brute force to identify private keys from the public key to decrypt important data. However, in quantum cryptology, we deal with Quantum Key Distribution (QKD) process where keys are symmetrical and are randomly generated in real-time making them virtually un-hackable.
7
44 reads
CURATED FROM
IDEAS CURATED BY
卐 || एकं सत विप्रा बहुधा वदन्ति || Enthusiast || Collection Of Some Best Reads || Decentralizing...
The idea is part of this collection:
Learn more about personaldevelopment with this collection
Ways to improve productivity
Strategies for reducing stress
Tips for managing email overload
Related collections
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
—
100+ Learning Journeys
—
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates