Personal tools

Quantum Cryptography and Quantum Key Distribution

Technion_010322A
[Churchill Auditorium - “Technion has a great contribution to make to Israel’s future prosperity, and Israel’s prosperity cannot but be of great benefit to other countries, as well.” - Winston Churchill (The late Prime Minister of Great Britain)]

 

- Overview

Quantum Key Distribution (QKD) is a secure communication method that uses quantum mechanics (often photons) to exchange cryptographic keys, enabling detection of any eavesdropper, as measurement disturbs the quantum state. \

QKD ensures data confidentiality by allowing only legitimate parties to generate a shared random key for encrypting and decrypting data, providing security against both current and future quantum computer attacks.

1. Key Concepts of Quantum Cryptography & QKD: 

  • Security Foundation: Unlike classical cryptography based on mathematical complexity, QKD relies on the laws of physics. It is considered to have "absolute safety" because any attempt to intercept the key alters its properties.
  • QKD Protocols: The most common protocol is BB84, which uses polarization of photons, introduced by Bennett and Brassard in 1984. Another approach is entanglement-based (E91), discovered by Artur Ekert in 1990.
  • How it Works: Two users (typically referred to as Alice and Bob) create a random key by encoding bits into photons. If an eavesdropper (Eve) attempts to measure these photons, she inevitably introduces errors due to the "no-cloning theorem," alerting the users.
  • Quantum Mechanics Principles: The security is based on superposition, where particles can exist in multiple states at once, and measurement collapses these states, leaving a detectable trace.


2. Applications and Current Status:

  • Data Protection: QKD protects sensitive data (such as in the health sector) for extended periods.
  • Hybrid Systems: QKD is often used in combination with classical algorithms, such as with QuintessenceLabs' qOptica 100 QKD system combined with Fortinet's FortiGate NGFW, to protect data in transit across wide-area networks.
  • Limitations: Current QKD is generally limited by distance (often using fiber optic networks or satellite), although quantum repeaters are being developed.


3. QKD vs. Post-Quantum Cryptography (PQC):

  • QKD (Hardware-based): Uses physical systems (photons) to send secure keys.
  • PQC (Software-based): Algorithms designed to be secure against future quantum computers, which are currently being standardized by NIST.

 

Quantum Key Distribution

Quantum Key Distribution (QKD) is a secure communication method that uses quantum mechanics to create and distribute cryptographic keys. The keys are used to encrypt and decrypt messages between two parties. 

Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. It uses properties found in quantum physics to exchange cryptographic keys in such a way that is provable and guarantees security. QKD enables two parties to produce and share a key that is used to encrypt and decrypt messages. Specifically, QKD is the method of distributing the key between parties.

QKD uses the unique properties of quantum mechanical systems to generate and distribute cryptographic keying material. The NIST QKD system transmits a stream of photons to generate a secret key at a rate of 1 million bits per second. 

QKD data is resistant to attack by quantum computers and other powerful computing resources. Because of the unique and fragile properties of photons, any third party who tries to read or copy the photons will change the photons' state. The endpoints will detect the change, alerting them that the key has been tampered with and must be discarded. 

The first QKD protocol, known as BB84, was proposed in 1984 by Charles Bennett and Gilles Brassard.

 

- Quantum Cryptography

Quantum cryptography, also known as quantum encryption, is a cybersecurity method for encrypting and transmitting data. It uses the laws of quantum mechanics to secure and transmit data in a way that cannot be hacked. 

Quantum cryptography uses the same physics principles and similar technology to communicate over a dedicated communications link. It harnesses the unpredictable nature of matter at the quantum level to encrypt and decrypt messages. 

The best known example of quantum cryptography is quantum key distribution, which offers a secure solution to the key exchange problem. 

Quantum cryptography is considered an essential security solution for safeguarding critical information in the 5G era. For example, Hyundai shipyard set up quantum cryptography communication to protect its defense technology.

 
 

[More to come ...]

 

 

Document Actions