• Skip to main content
  • Skip to primary sidebar

Technipages

Tutorials and fixes for smartphone, gadget, and computer problems

  • Topics
    • Android
    • Browsers
    • Gaming
    • Hardware
    • Internet
    • iPhone
    • Linux
    • macOS
    • Office
    • Reviews
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About
What Is Quantum Cryptography?

What Is Quantum Cryptography?

January 2, 2023 by Mel Hawthorne Leave a Comment

Quantum cryptography refers to cryptographic systems that rely on quantum mechanical effects and properties to perform cryptographic tasks. This is in contrast to classical cryptography used on modern computers. A fundamental requirement of quantum cryptography is the use of a quantum computer; it cannot be performed using a standard computer.

QKD

The main field in quantum cryptography is QKD. QKD stands for Quantum Key Distribution. Rather than using a fully quantum encryption process, QKD uses quantum effects to distribute a classical encryption key securely. This means that only a proven secure quantum communication system needs to be developed rather than much more complex quantum algorithms. It also reduces the physical requirements; technically, only a quantum network card would be required on a normal computer rather than an entire quantum computer.

Quantum mechanics reasonably lends itself to developing secure quantum communication systems. There are ways to communicate with quantum communication channels that an unauthorized third party cannot monitor without that intrusion being detectable.

The security of a quantum communication channel can also be reduced to a few highly minimal requirements. One such condition is for the two legitimate parties to have some way to authenticate with each other. Another requirement is simply that the laws of quantum mechanics apply.

The main issue for QKD comes from the difficulty of transmitting quantum information over significant distances. Current research allows for suitable key agreement rates over optical fibers as long as 550km. Beyond this distance, quantum repeaters are needed to ensure the signal is not lost in the noise. Additionally, routing quantum communications over a quantum Internet would be challenging. Current test systems tend to be point-to-point.

Other Fields of Research

Quantum effects can be utilized in the field of mistrustful quantum computing. Here, two parties can cooperate without trusting each other. The quantum system can be designed so that both parties can prove that the other was cheating. These methods, however, also rely on non-quantum effects such as special relativity.

Research is ongoing in other fields, such as requiring a recipient to be in a specific physical location even if two adversaries collude. Other schemes attempt to force even actively dishonest recipients to need to be honest by implementing overwhelming system requirements for the ability to be fraudulent. Much of this type of work has shown weaknesses in the current quantum implementations but has left the door open for future research in a very young field.

Quantum communication requires several things to be truly secure. Firstly, optical transmissions need to be capable of sending single photons. Current systems tend to use lasers that send multiple photons. Theoretically, an adversary could intercept one of many photons without leaving a trace. There is promising research in the development of single photon sources, though.

Secondly, photon detectors suffer from manufacturing tolerance-based differences, which open a window for an eavesdropper to inject themselves into the communication stream without being detected. This issue is impossible to resolve fully without infinitely tight tolerances, an infeasible requirement.

Conclusion

Quantum cryptography refers to cryptography that makes use of quantum mechanical effects. The current primary field is Quantum Key Distribution which uses quantum communication methods to transmit classical encryption keys. Quantum cryptography should not be confused with post-quantum cryptography.

You Might Also Like

  • What is Post-Quantum Cryptography?
    What is Post-Quantum Cryptography?

Filed Under: Hardware

Reader Interactions

Did this help? Let us know!

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Recent Posts

  • What is SMPS?
  • How to Find Watched Videos on Facebook in 2023
  • How to View Facebook Memories in 2023
  • How to Fix Google Maps Voice Directions Not Working
  • What Happens to Messages When You Permanently Delete Facebook
  • How to Connect Bluetooth Headphones to Steam Deck
  • How to Reset Root Password on Steam Deck
  • How to Update Steam Deck

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

You May Also Like

  • Cryptography
  • Public Key Cryptography

© Copyright 2023 Guiding Tech Media · All Rights Reserved · Privacy