Quantum Effects

      The universe is an aberrant place with its laws unfathomable. We may never know it’s true purpose of existence, but can only assume it. As a famous saying in quantum mechanics, reality is only what you choose it to be.
      Over the centuries, many scientists have put together a set of laws that intangibly define the known cosmos. But there’s a hitch, as there exists a world, a quantum world that shatters these laws, and a new set of laws and effects are observed  -The quantum effects.
     The effects that require quantum mechanics to be explained are called quantum effects. A quantum of light (photon) will behave either as a particle or wave, depending on how you measure it.
The quantum world starts vaguely below the range of 5 nanometres. There are many bizarre properties that lie in the quantum world like entanglement, Zeno effect, superposition, quantum tunnelling, and superconductivity to name a few.
Understanding these effects are key to the construction and building of the scientific future.

Quantum tunneling and Moore's law

      Electronics has seen its renaissance over the past 3-4 decades with the steep reduction in size of transistors. But just as much as we love microelectronics and its numerous applications in the small gadgets, there is a limit to the size and number of transistors we can fit in a specified area, as defined by Moore’s  law, as quantum effects take over after a certain range. As the distance between different transistor regions decreases, the electrons acquire the ability to penetrate the potential barriers, a phenomenon known as quantum tunnelling. This effect makes a transistor ineffective even when it’s turned off, as current will start leaking between transistors. Hence, at the current rate of progress in technology, after a few years transistors won’t get any smaller.
      It’s not possible to stop quantum tunnelling, hence a latest form of transistor design called tunnel transistor has become more prominent. In a traditional MOSFET, electrons move in conduction band from source to drain. The device can be switched OFF to ON if sufficient voltage is applied between the source and drain. But in tunnel transistors, electrons originate in the valence band and a small voltage applied to the gate lowers the conduction band of the channel and it overlaps in energy with the source valence band, allowing  electrons to tunnel into the channel.

Entanglement and Quantum                            Cryptography  

    Entanglement is a quantum phenomenon where knowing the quantum state of one entangled particle would instantly reveal the state of the other entangled particle, even if they were light years away. But measuring the state of one particle would instantly destroy the state of the other particle, hence the concept cannot be used in direct communication.  
    Entanglement occurs when a pair of  particles such as photons, interact physically. When a laser beam is fired through a certain type of crystal it causes individual photons to split into pairs of entangled photons.  
    Entanglement is a quantum phenomenon where knowing the quantum state of one entangled particle would instantly reveal the state of the other entangled particle, even if they were light years away. But measuring the state of one particle would instantly destroy the state of the other particle, hence the concept cannot be used in direct communication.  
    Entanglement sees its application in many other fields, like time keeping, where the quantum clocks containing entangled atoms measure the passage of time, and could be linked to form a worldwide network that could measure time independent of location. The application could be used in various time dependant systems like in GPS and stock markets.

 Entanglement is also used in quantum cryptography, where the particle is transferred using entanglement, and if the system is disturbed the receiver gets notified immediately.
Like traditional public key cryptography, unbreakable quantum keys in the form of photons are used in a system called quantum key distribution (QKD). In QKD, information about the key is sent via photons that have been randomly polarized. It restricts the photon such that it vibrates in only one plane, like up, down, right or left. The recipient uses polarized filters to decipher the key and then chooses an algorithm to encrypt the message. The message goes over normal communication channels, but no one can decipher them unless they have the exact quantum key. Anyone attempt at trying to read the data will change the quantum state and alert a security breach.
      In  August 2016, China successfully launched it’s quantum satellite- Micius. The satellite created pairs of entangled photons whose properties are dependent on each other beaming one half of each pair down to base stations in China and Austria.

  •    Quantum computers are programmed using a hundred tightly focussed laser beam into a vacuum chamber. Each laser beam is used to grab one atom or not by using atom traps. Positioning these atoms is a way to program it, or by carefully pushing the atoms from lowest energy state to highest energy state, by carefully chosen laser beams that shoot in one specific transition. By choosing the state and position to which the atoms are excited,a quantum computer is programmed.
  •      Quantum programming languages, like Microsoft’s Q# can be used to program quantum computers. Quantum Assembly language (QASM) is implemented in experiments with low depth quantum circuits.
  •     The IBM Quantum Experience (QX) enables anyone to easily connect to IBM’s quantum processors via the IBM Cloud, to run algorithms and experiments, on its 5 qubit quantum processors. Here’s the link to the cloud based quantum computing experience:
  • https://quantumexperience.ng.bluemix.net/qx/qasm

   The race to building quantum computers is on as these devices have the ability to change and destroy the world as we know it. Current encryption standards are termed safe only because it takes classical computers millions of years to decrypt the message, but with quantum computers, it can be done within days, or even hours, hence exposing the world of encryption to chaos. The hardest hit will be the RSA algorithm used by 99 percent of all applications, and hence the de facto encryption standard for any scenario requiring the secure transfer and storage of communication data or software updates.
  •     Fortunately, quantum computers mature enough to crack encryption standards aren’t developed yet, and there’s still a long way to go even after IBM’s recent launch of quantum computers of 50 qubits. But it’s just a matter of time...

                                                                                                                                                 Quantum Applications     
The uses of quantum effects are many and they are already helping in changing the world. 

  • Quantum cognition is an emerging field which uses the mathematical principles behind quantum mechanics could be used to better understand human behavior. Optoelectronics is the study of electronic devices that detect and control light, using quantum mechanical effects of light, like phototransistors, laser devices and optical fibre communication.
  • Blackbird uses quantum computers to test and simulate it’s jet designs, that are otherwise quite difficult for classical computers. Overall, quantum effects are revolutionizing the world with it being exploited to reshape the future of science as we know it.
  • As the famous physicist Neils Bohr puts it, “If quantum mechanics hasn’t shocked you, you haven’t understood it yet.”

DNS SERVERS- The Phone Book of The Internet

Ever wondered how your search in the URL box connects you to the desired webpage, even though computers understand only binary numbers? The answer is through a set of servers set across the world for the sake of translating the URL's like www.google.com into their respective IP addresses, understandable by computers. These servers are called DNS (Domain Name System) servers.
 
 So when you type in a website name, like www.nie .ac.in the browser first asks the operating system for the IP address of it, if the OS does not find the IP address in memory, it is configured to ask a resolving name server (RNS). provided by the ISP. If the RNS does not know the IP address, it requests the Root Servers, which differentiate the URL into top-level domains like .in, .com, .net, .gov, etc. The Root Server identifies the top-level domain as .in and gives the address of ".in" Top Level Domain Name Servers (TLD servers). Each top-level domain has a separate corresponding TLD server. The ".in" TLD server contains addresses of authoritative servers that house the address of nie.ac.in. The TLD servers will know the addresses of each authoritative server through the registrar, which updates the TLD servers when a new domain is purchased. Finally, the Authoritative servers grant the IP address of www.nie.ac.in. Considering the IP address of www.nie. ac.in as 118.151.209.27 (using PING command),it is stored by the resolving name server for further references and then submitted to the browser to connect to the server. All of this, in milliseconds!"

There are 13 DNS Root Servers across the world, 10 in the US, 1 in Stockholm, 1 in Japan, and 1 in London, which contain a complete database of domain names to help translate it to corresponding IP Addresses.
 
DNS Hijacking: This is a cyber-attack where the hacker gains access to the DNS server data of a target site. The hacker can modify the records to redirect the site's visitors to the attacker's desired site to download malicious viruses and worms. Reverse DNS lookup converts the IP address into a domain name, and this info can be used to verify whether the user entered the correct website or not.  

TECH ARTICLES

SCORPION-3 HOVERBIKE

Ever thought of zipping through traffic in air, or ride a bike that can fly? Well, that is now possible! A Russian drone start up called Hoversurf is creating an electric powered hoverbike that combines the technology of a motorbike and quadcopter technology. Dubbed the Scorpion-3,it is an easy to ride bike which has the ability to surf air by changing altitude and direction.It can reach heights of 10 metres and surf at a speed of 50 kmph while carrying a load of 120 kg
Here is the link to the video
"https://www.youtube.com/watch?v=odVFa_3lmiM"