Saturday, March 28, 2026

Multi-dimensional light can offer secure data storage.



"Researchers developed a holographic data storage approach that stores and retrieves information in three dimensions by combining the amplitude, phase, and polarization properties of light. Credit: Xiaodi Tan, Fujian Normal University in China" (ScitechDaily, This Multidimensional Holographic Breakthrough Stores Massive Data Inside Light Itself)

Holograms, or multidimensional light, are tools that can store and transport information. The hologram stores information in multiple layers. And then the image recognition system observes that data. This is one way to secure communication. Secured communication requires multiple variables. The wavelength. Or the colour of the image, the image itself, and sub-images in the image are things that can be used for secure communication. The image can act as the bit. 

We can say that the image of Donald Duck. It can have a value of 0 or goofy. It can have a value of zero. The system can send those images in a series of other images. And. The receiving system picks only images that mean zero or one. 







"The image shows (a) the holographic data storage system schematic diagram, (b) a schematic diagram illustrating the complex plane for double-phase decomposition of complex amplitude and (c) an example of a checkerboard pattern for two phase values m and n. Also shown are (d) an example of the intensity distribution at the image plane and (e) an example of phase distribution at the image plane. In (f), the first (I) and second (II) records are shown, with the readout shown in (g). Credit: Xiaodi Tan, Fujian Normal University in China"(ScitechDaily, This Multidimensional Holographic Breakthrough Stores Massive Data Inside Light Itself)


The system can also use different images as flashes, and then. The system can measure the time the image is visible. The system must see. A certain image. At a certain time, it accepts the bit. The system that tries to break the code must have all information about the key that the system uses to open the messages. 

In this model, the time the image is visible. It is the thing that determines the value of the bit. If the system sees the image in 2 seconds, the value of the image in the computer memory is 1. And if the time is shorter, the value is 0, for example. The image that the system sees can also include a word or letter. And that makes it possible. To create an encryption process that is very flexible and effective. 

https://scitechdaily.com/this-multidimensional-holographic-breakthrough-stores-massive-data-inside-light-itself/

Friday, March 20, 2026

Quantum encryption took a big step. Because of the Talbot effect.




“ Researchers at the University of Warsaw have demonstrated a new approach to quantum key distribution that leverages high-dimensional encoding and a classical optical phenomenon known as the Talbot effect. By exploiting time-bin superpositions of photons, the system can transmit more information while relying on a surprisingly simple experimental setup built from commercially available components. Credit: Shutterstock” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

Quantum cryptography is a new tool for enhancing the security of communication. In that model, the system connects information to a physical object. It can share information on different routes. And that makes eavesdropping difficult. It can use a certain color. Or a certain image. As. The key that allows the receiving system to access information. 

 But it's also vital for cases where the binary system wants to transform data into a quantum mode. Without quantum cryptography, the system cannot exchange information between binary and quantum states. The thing called. The Talbot effect is the tool. That can make quantum cryptography more effective.  The quantum network can share information to travel on different routes. It can use certain images to encrypt and decrypt information. In a Talbot-effect-based quantum network, it is possible to create quantum superposition and entanglement between quantum dots. And that makes it possible to create a quantum network. But there are also many other ways to benefit from the Talbot effect. 





“Detection of time-bin superpositions with the temporal Talbot carpet. Credit: Maciej Ogrodnik, University of Warsaw” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

“The Talbot effect is a diffraction effect first observed in 1836 by Henry Fox Talbot. When a plane wave is incident upon a periodic diffraction grating, the image of the grating is repeated at regular distances away from the grating plane. The regular distance. It is called the Talbot length. And the repeated images are called self-images or Talbot images. “ (Wikipedia, Talbot effect)

Furthermore, at half the Talbot length, a self-image also occurs, but phase-shifted by half a period (the physical meaning of this is that it is laterally shifted by half the width of the grating period). At smaller regular fractions of the Talbot length, sub-images can also be observed. At one-quarter of the Talbot length, the self-image is halved in size, and appears with half the period of the grating (thus twice as many images are seen). At one eighth of the Talbot length, the period and size of the images are halved again, and so forth, creating a fractal pattern. Of sub-images with ever-decreasing size, often referred to as a Talbot carpet. Talbot cavities are used for coherent beam combination of laser sets.” (Wikipedia, Talbot effect)





“The optical Talbot effect for monochromatic light, shown as a "Talbot carpet". At the bottom of the figure, the light can be seen diffracting through a grating, and this pattern is reproduced at the top of the picture (one Talbot length away from the grating). At regular fractions of the Talbot length, the sub-images form.(Wikipedia, Talbot effect)

The second image introduces the Talbot-effect, and there could be  millions of possibilities in the encryption key. As we see, the possibilities. It could be the number of quantum dots. The system is used for encryption. Also. Things like a wavelength (color). And the time at which the image remains could be the thing. That helps to create an encryption key. Also. The system can calculate. How many times? In a time unit, the image blinks can be used to create ultra-secure encryption keys. Also, the time between blinks can be a participant. In quantum encryption. The system can also share information between multiple data lines. And then it can collect that information in the points. Of those quantum dots. 

When we talk. About the effectiveness of quantum cryptography, the diversity of methods. It keeps those things safe. If the system uses multiple different ways to encode messages and other data. AI-based intelligent systems can use multiple things. And ways to secure data. In that kind of encryption, the image that the system transmits could be a teddy bear. Then the receiving system sees the dataset that matches the teddy bear image. When the system receives other information that is not delivered in the image form of a teddy bear, it denies that information. This means the image acts as a key that allows the receiving system to open the message. 


https://scitechdaily.com/scientists-harness-19th-century-optics-to-advance-quantum-encryption/


https://en.wikipedia.org/wiki/Talbot_effect


Sunday, March 15, 2026

The new Chinese radars can be a threat to stealth.


"Representative image of a Chinese Shenyang J-31, circa 2014." (Interesting Engineering)

The gallium oxide diodes can make it possible to create compact radars for stealth fighters. This system enables the creation of new shapes for stealth fighters' profiles. This allows free aerodynamic planning and the use of more accurate shapes.  But these kinds of systems. Makes it possible. To create more advanced radar systems than before. The simplest way is to install more radars on aircraft. Those radars and other sensors can observe the area around the craft. Those kinds of systems. They can search for incoming enemy missiles and aim the weapons. Into positions where they came. 

The system. It can be created by using multiple radar arrays. This means that the new jet-fighters can have radar systems. Those are like mosaics. Each of the pieces of the mosaic structure is an independently operating radar. This means that radar. This means that some of those radars can operate in passive mode. When some other radar illuminates that plane, those systems can track it. The problem with jammers is this. They must operate at the same frequency as radars. 

"By improving detection capabilities against drone swarms, the technology could strengthen air-defense networks."(Interesting Engineering)

That they must jam. So if the system sees that it’s jammed. It can shut down transmitters. And then the passive system. That is the radar receiver antenna. It can be used to track the jammer. In the same way. The radar-warning systems can have a triangular measurement system. That system can point the radar’s location with a very high accuracy. 

The mosaic-based arrays can scan an area using many radio frequencies. At the same time. Those kinds of systems can be more immune to jammers than old-fashioned radars. The radar operates as an entirety. The AI connects the data that the radar group gets. Then that AI. It can connect that data with the data flow. Which comes from other sources. Like optical sensors. Those sensors. They can be in other aircraft. Ground-based, or drones. 

Or they can operate onboard the plane. This means that those systems can get more data than ever before. And that makes those systems more intelligent and more effective than before. Those systems are based. On network-based solutions, which connect the entire battlefield. Into one entirety. The system shares data between multiple systems. 

The new radar systems use AI algorithms to analyze and sort information flow. Those new systems can detect drone swarms and then separate decoy drones from real drones. But the problem is that all drones can carry explosives. And they can all be devastating. The system. That AI can search and identify targets with new accuracy. The AI algorithms can also analyze threats with new accuracy. This thing makes the attackers and defenders deadlier than ever before. 


https://interestingengineering.com/innovation/chinas-semiconductor-enable-compact-radar


https://interestingengineering.com/military/chinese-radar-identify-decoy-drones-real-targets

Saturday, March 7, 2026

The new quantum devices offer more secure communication.



"Quantum computers typically require extreme conditions, including temperatures near absolute zero, which makes them difficult and expensive to operate. Researchers at Stanford have developed a nanoscale optical device that works at room temperature, using specially structured materials to link the spins of photons and electrons. Credit: Stock" (ScitechDaily, Room-Temperature Quantum Device Could Transform Future Communications)

Information plays a critical role in modern society. And this is why securing information is urgent. Without trusted and secure information. It’s impossible to share and receive trusted information. If someone can hack  mission-critical systems, it can cause complete chaos. Can you imagine a scenario where someone hacks the traffic lights? In the city? The hacker simply turns all traffic lights green. That causes complete chaos. Or what if somebody raises the lift bridge up? 

That is one of the things that can cause bad things. Because that blocks roads from ambulances and other emergency vehicles. And in a critical moment. Those kinds of roadblocks. They can be dangerous. Things like disinformation. Often delivered on the net. Disinformation is one of the reasons why we also need physical data security. We can, of course, transport information on USB sticks. But there is always a possibility. 

That somebody drops that stick from their pocket. The USB sticks are used to transport the decryption keys. The system that decrypts codes requires the right code key. That. It can calculate. Calculations. The encryption process is used backwards. The encryption system uses long binary numbers to encode data. So, the decryption system requires those binary numbers.

Another big problem is that the USB sticks are slow systems. Of course, we could encrypt data. Into those sticks in physical form. If we have the right systems, we could share every single file into the four parts. And store those parts in four different memory sticks. This means we can send those memory sticks with four couriers. The decryption process requires that the user have all four memory sticks. And then the decryption requires that those sticks be in the right order. 

Quantum encryption means. The system can send information using many physical routes. This means that the system can send data using different data transportation lines. Or it can simply use different frequencies. 

The problem with encryption and decryption is that without those things. The GSM telephones and the entire internet. They will not work. The encryption. It makes it possible. For multiple systems to communicate on the same frequency. Every data package. That travel in the net has an identifier in front of it. Before data transmission starts, the devices change those identifiers or keys. If those identifiers are wrong, the system denies those data packages. 

If that process does not work. The thing that the user hears is the white noise. The situation turns into a case. Lots of people. Talk with each other in a small space. Suddenly, the case happens. That people start to yell at each other. The ability to separate words becomes impossible. 


https://scitechdaily.com/room-temperature-quantum-device-could-transform-future-communications/


Multi-dimensional light can offer secure data storage.

"Researchers developed a holographic data storage approach that stores and retrieves information in three dimensions by combining the a...