QuantumNetics Logo.png

The Quantum πet (Web 4.0)



In everything we do, we seek to challenge how people see, use, and value data. Quantumπetics exists to align innovation with practical application, giving businesses, governments, organizations and universities access to the value of the Quantum πet (Web 4.0). The element Tantalum has an average of 2 Parts Per Million (ppm) in the earth’s crust and is remarkable for its unsurpassed performance in the diverse end uses that it serves.


"We believe that theory doesn’t change the world, so we pioneer real-world solutions that put potential into practice every day."

Illuminated Abstract Shapes
Working Together

Cryptographic (CQIs) Quantum Identities

When using The Quantum πet (Web 4.0), Quantum πet Explorers (QπEs) are issued to purchase a Cryptographic Quantum Identity (CQI). By harnessing Quantum Physics along with the combination of Biometrics and Molecular Biology in unison, no one can replicate your identity through means of fraud. The CQI is a digital print/avatar of your molecular makeup through DNA and other Biometric standards coupled with a Quantum Key Distribution (QKD).


The Quantum πet (Web 4.0)


Quantum Cryptography

Quantum (QKD) Key Distribution

Quantum Cryptography or Quantum Key Distribution (QKD) transmits photons through a filter (or polarizer) which randomly gives them one of four possible polarizations and bit designations: Vertical (One bit), Horizontal (Zero bit), 45 degree right (One bit), or 45 degree left (Zero bit).


The photons travel to a receiver, which uses two beam splitters (horizontal/vertical and diagonal) to “read” the polarization of each photon. The receiver does not know which beam splitter to use for each photon and has to guess which one to use.


Once the stream of photons has been sent, the receiver tells the sender which beam splitter was used for each of the photons in the sequence they were sent, and the sender compares that information with the sequence of polarizers used to send the key. The photons that were read using the wrong beam splitter are discarded, and the resulting sequence of bits becomes the key.

Quantum Computing.png


Post-Quantum (PQC)


Post-quantum cryptography (PQC) refers to cryptographic algorithms usually public-key algorithms that are thought to be secure against an attack by a quantum computer.


The National Institute of Standards and technology (NIST), as well as other Industry experts are undergoing cryptographic quantum development. These are newly created mathematical based cryptographic algorithms (post-quantum cryptography) that would protect the public-key infrastructure, some predict these algorithms might not be available until the year 2023.


Quantum cryptography, on the other hand, use the principles of quantum mechanics to send secure messages, and unlike mathematical encryption, is truly un-hackable.

The Quantum πet (Web 4.0)

Unprecedented Velocity. Impeccable Reliability.

Data has become the world’s most valuable resource and is relied upon as the new and trusted currency for accelerating innovation. With the new Quantum approach to encryption and analytics, IT must feed business users with the data they need to make informed business decisions in well managed and secure environments.



Quantumπetics has created the Quantumchain QChain which can validate & connect aka Quantify your Cryptographic Quantum Identity CQI to your Quantum SPCES and Quantum pplications Qpps.

Prism Coin