From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: cb84ca08b3f99a63e00ccc6561166701066737f6c7e346e5a0278871b6e317f8
Message ID: <199602271408.JAA10507@pipe2.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-02-27 14:46:58 UTC
Raw Date: Tue, 27 Feb 1996 22:46:58 +0800
From: John Young <jya@pipeline.com>
Date: Tue, 27 Feb 1996 22:46:58 +0800
To: cypherpunks@toad.com
Subject: PHO_ton
Message-ID: <199602271408.JAA10507@pipe2.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
New Scientist, 24 February 1996:
"Trick of the light fools forgers."
Researchers at U-Conn Storrs are developing security
systems that use a new kind of invisible code -- the
phase of light. A transparent phase mask over a photo on
a credit card would make it very difficult to forge. The
authenticity of the card is checked by a reader composed
of a laser light source and a device called an optical
correlator. Bahram Javidi, leading Storrs researcher,
will publish the latest findings in SPIE proceedings,
called "Optical Security and Counterfeit Deterrent
Techniques" (v 2659).
"Good connections, quantum style."
For quantum computers of the future, any "noise" in the
connection between sender and receiver could prove
disastrous. The problem is that the data in such
computers will be held in the form of individual photons
and, since quantum theory states that they cannot be
checked because the mere act of measuring them will
transform them, every error that creeps in will go
uncorrected. Now IBM researchers have come up with a way
to make the connection crystal clear (PRL, v 76, p 722).
[Cf. recent thread "IBM's Breakthrough."]
PHO_ton
Return to February 1996
Return to “John Young <jya@pipeline.com>”
1996-02-27 (Tue, 27 Feb 1996 22:46:58 +0800) - PHO_ton - John Young <jya@pipeline.com>