Skip to content
LogoTechnipages
LogoTechnipages
  • Topics
        • Android
        • Browsers
        • Gaming
        • Hardware
        • Internet
        • iPhone
        • Linux
        • macOS
        • Office
        • Reviews
        • Software
        • Windows
        • Definitions
        • All Recent Posts
  • Product Reviews
  • About

What Is Quantum Cryptography?

Mel HawthorneJanuary 2, 2023 Comments (0)
microsoft teams how secure is it

Quantum cryptography refers to cryptographic systems that rely on quantum mechanical effects and properties to perform cryptographic tasks. This is in contrast to classical cryptography used on modern computers. A fundamental requirement of quantum cryptography is the use of a quantum computer; it cannot be performed using a standard computer.

Contents

  • 1 QKD
  • 2 Other Fields of Research
  • 3 Conclusion

QKD

The main field in quantum cryptography is QKD. QKD stands for Quantum Key Distribution. Rather than using a fully quantum encryption process, QKD uses quantum effects to distribute a classical encryption key securely. This means that only a proven secure quantum communication system needs to be developed rather than much more complex quantum algorithms. It also reduces the physical requirements; technically, only a quantum network card would be required on a normal computer rather than an entire quantum computer.

Quantum mechanics reasonably lends itself to developing secure quantum communication systems. There are ways to communicate with quantum communication channels that an unauthorized third party cannot monitor without that intrusion being detectable.

The security of a quantum communication channel can also be reduced to a few highly minimal requirements. One such condition is for the two legitimate parties to have some way to authenticate with each other. Another requirement is simply that the laws of quantum mechanics apply.

The main issue for QKD comes from the difficulty of transmitting quantum information over significant distances. Current research allows for suitable key agreement rates over optical fibers as long as 550km. Beyond this distance, quantum repeaters are needed to ensure the signal is not lost in the noise. Additionally, routing quantum communications over a quantum Internet would be challenging. Current test systems tend to be point-to-point.

Other Fields of Research

Quantum effects can be utilized in the field of mistrustful quantum computing. Here, two parties can cooperate without trusting each other. The quantum system can be designed so that both parties can prove that the other was cheating. These methods, however, also rely on non-quantum effects such as special relativity.

Research is ongoing in other fields, such as requiring a recipient to be in a specific physical location even if two adversaries collude. Other schemes attempt to force even actively dishonest recipients to need to be honest by implementing overwhelming system requirements for the ability to be fraudulent. Much of this type of work has shown weaknesses in the current quantum implementations but has left the door open for future research in a very young field.

Quantum communication requires several things to be truly secure. Firstly, optical transmissions need to be capable of sending single photons. Current systems tend to use lasers that send multiple photons. Theoretically, an adversary could intercept one of many photons without leaving a trace. There is promising research in the development of single photon sources, though.

Secondly, photon detectors suffer from manufacturing tolerance-based differences, which open a window for an eavesdropper to inject themselves into the communication stream without being detected. This issue is impossible to resolve fully without infinitely tight tolerances, an infeasible requirement.

Conclusion

Quantum cryptography refers to cryptography that makes use of quantum mechanical effects. The current primary field is Quantum Key Distribution which uses quantum communication methods to transmit classical encryption keys. Quantum cryptography should not be confused with post-quantum cryptography.

Categories: Hardware

Author Mel Hawthorne

You Might Also Like

  • 3 Ways to Disable Amazon Echo Spot Camera

    Mitch BartlettHardware
  • How to Restart and Turn On Fitbit Charge 4

    Andrew MyrickHardware
  • fix-chromebook-system-is-repairing-itself

    Fix Chromebook: Your System Is Repairing Itself

    Madalina DinitaHardware

Leave a Reply

Your email address will not be published. Required fields are marked *

average laptop lifespan

What Is an Average Laptop Lifespan?

fix 0x80070302 windows update error

How to Fix the 0x80070302 Windows Update Error

how to allocate more memory to a program

How to Allocate More Memory to a Program in Windows

marvel rivals memory leak fix

Marvel Rivals Using Too Much Memory – How to Fix

how to create a macro in word

How to Create a Macro in Word

profile pic

The Experts Behind Technipages

My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

Learn More

technipages logo white
linkedin icon

Technipages is part of Guiding Tech Media, a leading digital media publisher focused on helping people figure out technology. Learn more about our mission and team here.

© 2025 Guiding Tech Media All Rights Reserved

  • About Us
  • Contact
  • Legal & Privacy

© 2025 Guiding Tech Media All Rights Reserved

Information from your device can be used to personalize your ad experience.
Do not sell my personal information.

Last Updated on January 2, 2023 by Judy Sanhz