SlideShare a Scribd company logo
Business goes quantum 
Money changes hands in key bank transaction. 
One of the most secure methods of quantum cryptography has been used commercially – for a single transaction, at least. On 21 April, Austrian scientists used the technique to transfer a €3,000 donation to their lab. 
Quantum cryptography uses the odd properties of quantum particles to create secure keys for encoding and decoding messages. The very act of observing these particles changes their nature, making it easy to detect any eavesdroppers. 
Anton Zeilinger, a quantum physicist at the University of Vienna, and his team carried out their bank transaction by applying a particularly secure technique that uses a pair of entangled photons to create the key. 
The properties of these photons depend on each other, even when they are separated by long distances. After entangling the pair, one is sent to the recipient. Upon arrival, both photons are measured by their respective owners. This act of measurement determines the state of the photons, and thus the state of the key. 
Before measurement, neither photon carries any useful information that could be stolen by a snoop. ‘This makes data transmission more secure’, says Zeilinger. 
In last week’s trial, the entangled photons were created in a branch of the Bank of Austria in Vienna. One was sent to the city hall through a 1,450-metre-long fibreglass cable. The transfer took 90 seconds to complete; the money was then donated to Zeilinger’s lab. 
Some companies already sell quantum-cryptography hardware. But these systems use single photons to communicate the key. In such systems, there is a small possibility that the key could be intercepted without anyone noticing. Zeilinger's photon pairs eliminate this potential flaw, he says. 
It has taken Zeilinger’s group two years to create a commercial prototype of entangled-photon cryptography, with the help of the Austrian company ARC Seibersdorf Research. So far, the system works well enough for a single test, but it is not quite ready for sale. ‘We hope that all problems of implementation will be solved within three years’, says Zeilinger. 
© http://www.nature.com/news/2004/040426/full/news040426-9.html

More Related Content

Similar to Example news story

Scalable solutions for quantum communication networks
Scalable solutions for quantum communication networksScalable solutions for quantum communication networks
Scalable solutions for quantum communication networks
Bruno Fedrici, PhD
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
M010118087
M010118087M010118087
M010118087
IOSR Journals
 
Microcontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyMicrocontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM Technology
IOSR Journals
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
ijcisjournal
 
Technology of ZnSe detectors 2011
Technology of ZnSe detectors 2011Technology of ZnSe detectors 2011
Technology of ZnSe detectors 2011
Andrii Sofiienko
 
Zero days in stuxnet
Zero days in stuxnetZero days in stuxnet
Zero days in stuxnet
keshav kumar
 
Quantum teleportation salma
Quantum teleportation salmaQuantum teleportation salma
Quantum teleportation salma
Anusha Reddy
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
How to film firing neurons inside science
How to film firing neurons   inside scienceHow to film firing neurons   inside science
How to film firing neurons inside science
Curtis Cripe
 
Cristian Randieri Extended Curriculum (English CV)
Cristian Randieri Extended Curriculum (English CV)Cristian Randieri Extended Curriculum (English CV)
Cristian Randieri Extended Curriculum (English CV)
Cristian Randieri PhD
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
IRJET Journal
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
Computer Assisted Diagnosis And Automation In Medical Practice
Computer Assisted Diagnosis And Automation In Medical PracticeComputer Assisted Diagnosis And Automation In Medical Practice
Computer Assisted Diagnosis And Automation In Medical Practice
Genevieve Warner Learmonth
 
Scanty Security?
Scanty Security?Scanty Security?
Scanty Security?
Joanna Lowy
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Workguest13f6ca
 
Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)
Bharath Kumar
 

Similar to Example news story (20)

Scalable solutions for quantum communication networks
Scalable solutions for quantum communication networksScalable solutions for quantum communication networks
Scalable solutions for quantum communication networks
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
M010118087
M010118087M010118087
M010118087
 
Microcontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyMicrocontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM Technology
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
 
Technology of ZnSe detectors 2011
Technology of ZnSe detectors 2011Technology of ZnSe detectors 2011
Technology of ZnSe detectors 2011
 
J-J.Quisquater
J-J.QuisquaterJ-J.Quisquater
J-J.Quisquater
 
D.Samyde
D.SamydeD.Samyde
D.Samyde
 
Zero days in stuxnet
Zero days in stuxnetZero days in stuxnet
Zero days in stuxnet
 
Quantum teleportation salma
Quantum teleportation salmaQuantum teleportation salma
Quantum teleportation salma
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
How to film firing neurons inside science
How to film firing neurons   inside scienceHow to film firing neurons   inside science
How to film firing neurons inside science
 
Cristian Randieri Extended Curriculum (English CV)
Cristian Randieri Extended Curriculum (English CV)Cristian Randieri Extended Curriculum (English CV)
Cristian Randieri Extended Curriculum (English CV)
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
Computer Assisted Diagnosis And Automation In Medical Practice
Computer Assisted Diagnosis And Automation In Medical PracticeComputer Assisted Diagnosis And Automation In Medical Practice
Computer Assisted Diagnosis And Automation In Medical Practice
 
Scanty Security?
Scanty Security?Scanty Security?
Scanty Security?
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)
 

More from Incubation & Industry

Business model theory part 2
Business model theory part 2Business model theory part 2
Business model theory part 2
Incubation & Industry
 
Business model theory part 1
Business model theory part 1Business model theory part 1
Business model theory part 1
Incubation & Industry
 
Market segmentation Target Market - Workbook
 Market segmentation Target Market - Workbook Market segmentation Target Market - Workbook
Market segmentation Target Market - Workbook
Incubation & Industry
 
Target segmentation theory
Target segmentation   theoryTarget segmentation   theory
Target segmentation theory
Incubation & Industry
 
The value proposition builder workbook
The value proposition builder workbookThe value proposition builder workbook
The value proposition builder workbook
Incubation & Industry
 
The value proposition builder
The value proposition builderThe value proposition builder
The value proposition builder
Incubation & Industry
 
Growth engine istart-june-2016
Growth engine istart-june-2016Growth engine istart-june-2016
Growth engine istart-june-2016
Incubation & Industry
 
9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference
Incubation & Industry
 
Science com in a formula
Science com in a formulaScience com in a formula
Science com in a formula
Incubation & Industry
 
Intro to scientific presentations 2010
Intro to scientific presentations 2010Intro to scientific presentations 2010
Intro to scientific presentations 2010
Incubation & Industry
 
Guide to succeding in iot v1
Guide to succeding in iot v1Guide to succeding in iot v1
Guide to succeding in iot v1
Incubation & Industry
 
Emergence of io t
Emergence of io tEmergence of io t
Emergence of io t
Incubation & Industry
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
Incubation & Industry
 
Do’s and don’ts of presenting research
Do’s and don’ts of presenting researchDo’s and don’ts of presenting research
Do’s and don’ts of presenting research
Incubation & Industry
 
Presentation about Presentations
Presentation about PresentationsPresentation about Presentations
Presentation about Presentations
Incubation & Industry
 
Intro the starting point
Intro  the starting pointIntro  the starting point
Intro the starting point
Incubation & Industry
 
Value Proposition Designer - eXia case
Value Proposition Designer - eXia caseValue Proposition Designer - eXia case
Value Proposition Designer - eXia caseIncubation & Industry
 

More from Incubation & Industry (20)

Business model theory part 2
Business model theory part 2Business model theory part 2
Business model theory part 2
 
Business model theory part 1
Business model theory part 1Business model theory part 1
Business model theory part 1
 
Market segmentation Target Market - Workbook
 Market segmentation Target Market - Workbook Market segmentation Target Market - Workbook
Market segmentation Target Market - Workbook
 
Target segmentation theory
Target segmentation   theoryTarget segmentation   theory
Target segmentation theory
 
The value proposition builder workbook
The value proposition builder workbookThe value proposition builder workbook
The value proposition builder workbook
 
The value proposition builder
The value proposition builderThe value proposition builder
The value proposition builder
 
Growth engine istart-june-2016
Growth engine istart-june-2016Growth engine istart-june-2016
Growth engine istart-june-2016
 
9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference
 
Science com in a formula
Science com in a formulaScience com in a formula
Science com in a formula
 
Intro to scientific presentations 2010
Intro to scientific presentations 2010Intro to scientific presentations 2010
Intro to scientific presentations 2010
 
Guide to succeding in iot v1
Guide to succeding in iot v1Guide to succeding in iot v1
Guide to succeding in iot v1
 
Challenges of the io t v1
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1
 
Domains of io t v1
Domains of io t v1Domains of io t v1
Domains of io t v1
 
Emergence of io t
Emergence of io tEmergence of io t
Emergence of io t
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
Do’s and don’ts of presenting research
Do’s and don’ts of presenting researchDo’s and don’ts of presenting research
Do’s and don’ts of presenting research
 
Presentation about Presentations
Presentation about PresentationsPresentation about Presentations
Presentation about Presentations
 
Intro the starting point
Intro  the starting pointIntro  the starting point
Intro the starting point
 
ORW introduction and welcome
ORW introduction and welcomeORW introduction and welcome
ORW introduction and welcome
 
Value Proposition Designer - eXia case
Value Proposition Designer - eXia caseValue Proposition Designer - eXia case
Value Proposition Designer - eXia case
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Example news story

  • 1. Business goes quantum Money changes hands in key bank transaction. One of the most secure methods of quantum cryptography has been used commercially – for a single transaction, at least. On 21 April, Austrian scientists used the technique to transfer a €3,000 donation to their lab. Quantum cryptography uses the odd properties of quantum particles to create secure keys for encoding and decoding messages. The very act of observing these particles changes their nature, making it easy to detect any eavesdroppers. Anton Zeilinger, a quantum physicist at the University of Vienna, and his team carried out their bank transaction by applying a particularly secure technique that uses a pair of entangled photons to create the key. The properties of these photons depend on each other, even when they are separated by long distances. After entangling the pair, one is sent to the recipient. Upon arrival, both photons are measured by their respective owners. This act of measurement determines the state of the photons, and thus the state of the key. Before measurement, neither photon carries any useful information that could be stolen by a snoop. ‘This makes data transmission more secure’, says Zeilinger. In last week’s trial, the entangled photons were created in a branch of the Bank of Austria in Vienna. One was sent to the city hall through a 1,450-metre-long fibreglass cable. The transfer took 90 seconds to complete; the money was then donated to Zeilinger’s lab. Some companies already sell quantum-cryptography hardware. But these systems use single photons to communicate the key. In such systems, there is a small possibility that the key could be intercepted without anyone noticing. Zeilinger's photon pairs eliminate this potential flaw, he says. It has taken Zeilinger’s group two years to create a commercial prototype of entangled-photon cryptography, with the help of the Austrian company ARC Seibersdorf Research. So far, the system works well enough for a single test, but it is not quite ready for sale. ‘We hope that all problems of implementation will be solved within three years’, says Zeilinger. © http://www.nature.com/news/2004/040426/full/news040426-9.html