promotion image of download ymail app

how data in optical fiber can be secured from tapping?

these days data from the optical fiber can too be tapped and decrypted.....what are the ways byt which these data can be secured and if possible any site which can provide such info other than


i think ur dad is a bit tensed and frustrated with maybe some official matters or so....... but u dont go on rampage.. seems it is time for some open dad-son talk.... try it..

5 Answers

  • 1 decade ago
    Favorite Answer

    There are several techniques for detecting unauthorized taps on optical fibre, such as

    Failing that there is cryptography ... strong (512 bits+) encryption of the data itself so that even if it is tapped it is infeasible to break it. (Well, unless you're the NSA with acres of mainframes to devote to the job). The holy grail of cryptography is Quantum Cryptography. While not yet commerically available, scientists are close.

    There is a good discussion of the topic at

    • Commenter avatarLogin to reply the answers
  • M L
    Lv 4
    1 decade ago

    The most promising field is quantum cryptography. There are a number of physics research groups trying to bring this technique to a level of functionality that could enjoy widespread use, but it is still in the early development stages. The article below is on using "polarization entangled photon pairs" to establish highly secure keys. This article requires a significant knowledge of physics and math to be understood in its entirety, but even if you don't have this you should be able to glean the basic concept from it. (I'm not sure, but you may need proxy access from a research institution or major library to access it...if so, use and search for "photon entanglement quantum cryptography" and plenty of info should pop up)

    Source(s): I know a bunch of physicists. some light reading:
    • Commenter avatarLogin to reply the answers
  • 1 decade ago

    anything you need about technical information is available plenty of examples at search your word and will find many companies related.

    It's great and "too updated".

    Have a nice day!!


    • Commenter avatarLogin to reply the answers
  • Sam
    Lv 7
    1 decade ago

    Have encryption/decryption equipment at either end.

    • Commenter avatarLogin to reply the answers
  • How do you think about the answers? You can sign in to vote the answer.
  • Anonymous
    1 decade ago

    check out, I agree!!

    • Commenter avatarLogin to reply the answers
Still have questions? Get your answers by asking now.