Bluesky Facebook Reddit Email

Trust is good, quantum trickery is better

Researchers prove the security of device-independent quantum cryptography using a new approach called entropy accumulation. This breakthrough paves the way for practical realization of such schemes with state-of-the-art quantum technology.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Key component for quantum computing invented

A Sydney team has invented a microcircuit based on Nobel Prize research, miniaturizing a crucial component for quantum computing. This innovation could pave the way for large-scale integration of quantum circuits and manufacturing in massive quantities.

Three faculty members receive NSF Convergence grants

Penn State faculty members Ming Xiao, Heng Xu, and Jun Zhu receive NSF Convergence grants to support interdisciplinary research on permafrost coastal erosion, crowdsourcing research, and quantum science. The grants aim to bring together experts from various fields to address complex challenges and advance scientific discovery.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Random numbers: Hard times ahead for hackers

Researchers at the University of Geneva have created a self-testing quantum random number generator that ensures reliability and unpredictability. This device allows users to verify generated numbers in real-time, making it difficult for hackers to exploit bias or imperfections.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Quantum key system could make mobile transactions far more secure

Researchers have demonstrated a prototype device that can send unbreakable secret keys from a handheld device to a terminal, enabling secure mobile transactions. The system uses ultra-fast LEDs and moveable mirrors to transmit keys at a rate of over 30 kilobytes per second.

A new technique for creation of entangled photon states developed

Physicists at Lomonosov Moscow State University have created a new technique for generating entangled photon states, exhibiting correlated pairs that can be used in quantum cryptography. The technique uses spatial entanglement creation and has shown improved efficiency compared to previous methods.

Russian scientists develop long-range secure quantum communication system

Researchers from ITMO University have developed a novel approach to constructing quantum communication systems, enabling the transmission of single-photon quantum signals across distances of up to 250 kilometers. The system uses side frequencies to simplify device architecture and increase pass-through capacity, making it comparable to...

The 'great smoky dragon' of quantum physics

Recent study confirms wave-particle duality in quantum mechanics by recreating John Archibald Wheeler's 'great smoky dragon' thought experiment. The research demonstrates that the nature of light is not fixed until observed, with implications for quantum cryptography and computing.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Protected Majorana states for quantum information

Majorana zero modes are present and protected in a superconducting state, storing quantum information in a way that leaves the quantum state intact when either location is disturbed. This finding verifies previous experiments and goes further by showing that Majorana modes are protected as predicted theoretically.

Three 'twisted' photons in 3 dimensions

Researchers have achieved a new milestone in quantum physics by entangling three particles of light in a high-dimensional quantum property. This breakthrough has the potential to revolutionize quantum encryption and secure communication, enabling multiple parties to share information with unconditional security.

Swedish researchers reveal security hole

Researchers from Linköping University discovered that energy-time entanglement is vulnerable to attack, allowing eavesdropping on traffic without detection. They propose countermeasures to solve the problem.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

Blind signatures using offline repositories

Researchers have developed a new method for secure data transmission utilizing offline repositories and quantum information to overcome quantum computing threats. The approach provides robust authentication and authorship uniqueness, paving the way for potential applications in untraceable transactions.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

Quantum cause and effect

Researchers at Perimeter Institute and IQC have discovered a new class of quantum advantages that allow for cause-effect correlation determination without intervention. This breakthrough has significance for both quantum information and quantum foundations, underpinning the promise of quantum technologies.

Electron pairs on demand

Researchers from Leibniz University Hannover and PTB have successfully demonstrated the on-demand emission of electron pairs from a semiconductor quantum dot. The resulting electron pairs were found to be spatially separated with over 90% efficiency, a crucial step towards future applications such as quantum computing and cryptography.

Squeezed quantum communication

Physicists successfully transmit a flash of light in a sensitive quantum state through the atmosphere, enabling secure quantum communication. The technology has potential advantages over current methods, including ability to transmit in sunlight and higher transmission rates.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Quantum cryptography for mobile phones

Researchers at the University of Bristol have developed a scheme to enable quantum cryptography on mobile phones, using photons as information carriers. This breakthrough technology has the potential to make secure communication available to the general public.

Keeping secrets in a world of spies and mistrust

Researchers Artur Ekert and Renato Renner propose a way to use quantum properties of particles of light to share secret keys for secure communication. They found that certain correlations can protect us against adversaries with superior technology, even if our choices are not completely predictable.

Quantum physics secures new cryptography scheme

Researchers have demonstrated a form of quantum cryptography that protects people doing business with others they may not trust. The protocol, known as 1-2 random oblivious transfer (ROT), allows two parties to securely exchange information without revealing their picks, making it ideal for secure identification and online transactions.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

An infallible quantum measurement

Physicists at the University of Innsbruck have developed a new method to verify entanglement between several objects, using device-independent witnesses. This approach allows for high-confidence statements about entanglement with minimal assumptions.

U of T awards quantum mechanics prize to pioneering physicists

The University of Toronto has awarded Michel Devoret and Robert Schoelkopf the John Stewart Bell Prize for their groundbreaking contributions to quantum mechanics. Their pioneering work in 'circuit quantum electrodynamics' has opened up new avenues for studying fundamental quantum physics.

Just how secure is quantum cryptography?

Theorists have found new methods to determine the likelihood of quantum encryption scheme failure, enabling device-independent cryptography. This allows for the estimation of failure probabilities without relying on assumptions about the reliability of devices.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Quantum cryptography: On wings of light

Scientists have transmitted a secure quantum code via satellite, promising secure global communication. The experiment uses quantum states of single light quanta, making data transmission virtually un-hackable.

Space race under way to create quantum satellite

Researchers are pursuing a quantum satellite concept to establish a secure global quantum communication network by harnessing the signal's travel time in empty space. The team has emphasized precise alignment between the satellite and ground stations to ensure accurate measurement of photons.

Quantum cryptography put to work for electric grid security

The Los Alamos National Laboratory team successfully demonstrated securing control data for electric grids using quantum cryptography. The system achieved latencies of at least two orders of magnitude smaller than requirements, making it suitable for real-time applications.

Extending Einstein

Physicists have demonstrated a new type of quantum entanglement using three particles, building on Einstein's original ideas. This experiment may lead to the creation of hybrid quantum systems with multiple unique properties.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Hi-fi single photons

A French team identified key parameters to generate high-fidelity single photons, crucial for quantum computing and communication. They simulated detector properties and experimental results to improve reliability.

Paving the way to Canada's next big industry -- the quantum information frontier

Quantum computing is transforming computing, communications and other technologies with its groundbreaking capabilities. Researchers at the Institute for Quantum Computing are harnessing the forces of quantum mechanics to build incredible new technologies that will revolutionize information processing, storage, sharing and understanding.

Making quantum cryptography truly secure

Researchers in Singapore and Norway have created a 'perfect eavesdropper' that exploits an overlooked loophole in quantum key distribution (QKD) to obtain a shared secret key. This discovery highlights the importance of identifying imperfections in QKD implementation to ensure its security.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

Physicists move closer to efficient single-photon sources

Researchers have made significant progress in creating efficient single-photon sources using fluorescent 'defect centers' in diamond. These structures can be used to implement provably secure quantum cryptography schemes and potentially build solid-state quantum computers. The team's innovations include the development of nanofabricati...

Vulnerability in commercial quanto cryptography

Researchers found a technique to remotely control a key component of most quantum cryptography systems, exploiting imperfections in photon detectors. Countermeasures have been implemented with ID Quantique, a leading manufacturer, to secure the technology.

More accurate than Heisenberg allows?

Researchers from LMU and ETH Zurich have shown that position and momentum can be predicted more precisely than Heisenberg's Uncertainty Principle allows, using a quantum memory. This breakthrough enhances our understanding of quantum memories and provides a method for determining entanglement.

Researchers unite to distribute quantum keys

The network, built by 41 organizations, allows for secure transmission of data beyond classical methods using quantum cryptography. The researchers achieved a record-breaking transmission capacity of up to 8 nodes with links ranging from 20 to 83 kilometers.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Scientists demonstrate all-fiber quantum logic

Researchers at the University of Bristol have successfully implemented a high-fidelity fibre controlled-NOT gate using single photons in optical fibres. This achievement paves the way for more sophisticated quantum networks with increased range and potential applications in computing, communication, and advanced measurement.

JILA solves problem of quantum dot 'blinking'

Scientists at JILA have found a way to suppress the 'blinking' issue in quantum dots, increasing their photon emission rate four- to fivefold. By using an antioxidant chemical solution, they reduced the average time delay between excitation and photon emission from 21 nanoseconds to 4 nanoseconds.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

'Dead time' limits quantum cryptography speeds

The maximum transmission rate of quantum-encrypted messages is limited by detector dead times, which can compromise security. Researchers aim to reduce these times to increase speeds and enhance wireless cryptography.

First quantum cryptographic data network demonstrated

Researchers at Northwestern University have successfully integrated quantum key distribution and quantum data encryption to create a complete quantum cryptographic data network. This new system offers extraordinary resilience to eavesdropping and is compatible with standard fiber optical networks.

Quantum decoys foil code-breaking attempts

A new technique manipulates laser light to create decoy signals, distracting eavesdroppers and protecting secret messages. This development has immediate commercial applications, improving the security of fibre-optic communications.

Quantum cryptography

Researchers at Perimeter Institute outline a new aspect of Quantum Cryptography, improving the security of data transmission. The study demonstrates enhanced capabilities in quantum key distribution, paving the way for widespread adoption in secure communication networks.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

NIST photon detectors have record efficiency

Physicists at NIST have demonstrated single photon detectors with an 88% efficiency, a significant improvement over previous designs. The detectors use a tungsten film chilled to near-absolute zero and are expected to enable reliable quantum communications systems.

NIST quantum keys system sets speed record for 'unbreakable' encryption

The NIST quantum key distribution system generates a verifiably secret key at a rate of 1 million bits per second, about 100 times faster than previously reported systems. The system uses time-stamping and high-speed observations to identify photons from the sender among multiple photons from other sources.

Single photon detector conquers the dark side

The NIST-developed device detects single photons with negligible dark counts using a tungsten film coupled to fiber optic communication line. It achieves a detection rate of 20,000 photons per second with an efficiency of 20%, aiming for over 80% improvement.

Keeping information secure with noisy light

Researchers have developed a high-speed encryption protocol using noisy light to secure information, promising unconditionally secure, fast, easy-to-manage, and cost-efficient security. The Northwestern method transmits encrypted data at 250 megabits per second, outpacing conventional cryptography and existing quantum methods.