Abstract

Quantum technology, and especially quantum computing, is advancing rapidly. Our every-day secure communication infrastructure relies heavily on public key cryptography; unfortunately, many public key schemes are in fact insecure against quantum algorithms. Furthermore, adversaries who, today, capture information encrypted using classical key distribution systems, can wait and, as soon as quantum computers of sufficient power become available, they may decipher all previously captured information. While some new “post-quantum” public key systems are assumed to be secure against quantum computers, this is only an assumption and, even if the assumption remains valid, still results in systems that are less efficient for end-users than the more commonly used public key systems employed today. While the advent of quantum technology may seem detrimental to security, in fact, one may harness the power of quantum through quantum key distribution (QKD) for stronger security guarantees. Such QKD protocols allow two (or more) parties to establish a shared secret key, secure against an all-powerful adversary. Perhaps surprising is that QKD technology is already here both experimentally and commercially. This tutorial serves as an introduction to basic QKD along with QKD technology from a practical perspective. Quantum communication is a highly interdisciplinary field of research and one of the goals of this article is to introduce a larger set of researchers and practitioners to its study in the hopes of furthering its progress and eventual wide-scale adoption.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.