Download presentation
Presentation is loading. Please wait.
Published byAnna Matthews Modified over 9 years ago
2
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important for understanding the environments in which the U.S. military operates. FMSO's work today is still aimed at publication in unclassified journals and its research findings are taught in both military and civilian venues in the United States and around the world. FMSO is organized in the U.S. Army Training and Doctrine Command under the TRADOC G-2. Foreign Military Studies Office
3
The views expressed in this presentation are those of the author and do not necessarily represent the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Disclaimer
4
PLA University of Science & Technology “Dissidence and Human Rights in China” by “Ian Holton” Licensed under “CC-BY)
7
1.Quantum Physics versus Classical Physics 2.Quantum Computer 3.Quantum Encryption 4.China 5.Possible Implications Overview
9
“The world is in the midst of a second quantum revolution.” Jonathan P. Dowling & Gerard J. Milburn
10
1.The theoretical basis of modern physics that explains the nature and behavior of matter and energy on the atomic and subatomic level. 2.Quantum physics is qualitatively different than what we experience in our everyday lives. 3.The quantum world is at the very smallest scale of reality. 4.It is random and interconnected. 5.How can we take these tiny elements and blow up their capabilities? What is Quantum?
11
Quantum Entanglement
12
Spooky action from a distance.
13
The Quantum Computer
14
A nation’s success in military operations often rises and falls on the basis of how well it communicates. When a nation does not secure its communications effectively, its enemies intercept and read its communications and win thereby military and diplomatic advantages. Southeast Asia: Working Against the Tide National Security Agency 1970
15
Evolution of Cryptography
16
Diffie-Hellman (DH) algorithm 1976 Public Key Distribution Rivest, Shamir, Alderman (RSA) 1977 Evolution of Cryptography
17
Charles H. Bennett & Gilles Brassard BB84 Protocol Evolution of Cryptography The next step?
18
Guo Guangcan Est 2001
19
Pan Jianwei Thousand Talents Program
20
Alice Eve Bob Quantum Encryption
21
https://www.youtube.com/watch?v=UVzRbU6y7Ks Quantum Encryption
22
Classical Channel Quantum Encryption
24
Process A 0 1 Machine A Quantum Encryption
26
Machine B Process B 0 ? Quantum Encryption
27
Machine BMachine A Quantum Encryption
29
75% Quantum Encryption
31
50% Right machine 50% Wrong machine Quantum Encryption
36
https://www.youtube.com/watch?v=UVzRbU6y7Ks Quantum Encryption
38
Options 1.Fiber Optic Cable 2.Teleportation Transmitting the Data
39
Image source: Science Daily Fiber Optic Cable Transmitting the Data
40
Image source: Wired Teleportation Transmitting the Data
41
Image source: Wired Transmitting the Data “A functional satellite-based quantum communication system would give the Chinese military the ability to operate further afield without fear of message interception.” Matthew Luce Defense Group Inc. Center for Intelligence Research and analysis
42
2004: 125-km fiber point-to point QKD experiment 2005: Provided an “experimental demonstration of five-photon entanglement and open-destination teleportation. 2006: Quantum teleportation of a two-particle system. 2007: Creation of first quantum router. 2009: Built the world's first quantum encrypted government network. 2012: Teleportation of multiple photons 97 km. China
43
2012: China designated quantum information technology as one four key areas of scientific research in the next 15 years. 2016: To launch the first “Chinese Quantum Science Satellite.” China
44
South China Morning Post Nov 2014
46
Possible Implications Quantum computerQuantum encryption Can break modern day encryption systems Can solve complex questions Economic advantage Theoretically unbreakable Economic advantage Research and Development Research in quantum apps can expose weaknesses in a network should another nation win the race.
48
cindy.a.hurst2.ctr@mail.mil
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.