{"id":10851,"date":"2013-09-06T22:31:03","date_gmt":"2013-09-07T03:31:03","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=10851"},"modified":"2013-09-06T19:32:32","modified_gmt":"2013-09-07T00:32:32","slug":"toshiba-has-invented-a-quantum-cryptography-network-that-even-the-nsa-cant-hack","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=10851","title":{"rendered":"Toshiba has invented a quantum cryptography network that even the NSA can\u2019t hack"},"content":{"rendered":"<blockquote><p>A quantum network uses specially polarized photons to encode an encryption key\u2014a very long series of numbers and letters that can unlock a digital file. The photons are then sent down a fiber optic cable until they reach their destination, a photon detector, which counts them, and delivers the key to the intended recipient. If the photons are interfered with, the individual packets of information are forever altered and the recipient can see the telltale signs of tampering.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/qz.com\/121143\/toshiba-has-invented-a-quantum-cryptography-network-that-even-the-nsa-cant-hack\/\">Toshiba has invented a quantum cryptography network that even the NSA can\u2019t hack &#8211; Quartz<\/a>.<\/p>\n<blockquote><p><span class=\"anno-span\">Current quantum cryptography systems\u00a0from companies like\u00a0ID Quantique\u00a0start at around $50,000, and only connect two parties at a time. \u201cIf up to 64 people can share a single photon detector than you can spread out those costs,\u201d Shields said. <\/span><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>A quantum network uses specially polarized photons to encode an encryption key\u2014a very long series of numbers and letters that can unlock a digital file. The photons are then sent down a fiber optic cable until they reach their destination, &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=10851\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[338,803],"class_list":["post-10851","post","type-post","status-publish","format-standard","hentry","category-networking","tag-encryption","tag-quantum-networks"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/10851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10851"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/10851\/revisions"}],"predecessor-version":[{"id":10852,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/10851\/revisions\/10852"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10851"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}