Quantum cryptography | Cryptography | Quantum information science

Quantum key distribution

Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the best-known example of a quantum cryptographic task. An important and unique property of quantum key distribution is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. This results from a fundamental aspect of quantum mechanics: the process of measuring a quantum system in general disturbs the system. A third party trying to eavesdrop on the key must in some way measure it, thus introducing detectable anomalies. By using quantum superpositions or quantum entanglement and transmitting information in quantum states, a communication system can be implemented that detects eavesdropping. If the level of eavesdropping is below a certain threshold, a key can be produced that is guaranteed to be secure (i.e., the eavesdropper has no information about it), otherwise no secure key is possible and communication is aborted. The security of encryption that uses quantum key distribution relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography, which relies on the computational difficulty of certain mathematical functions, and cannot provide any mathematical proof as to the actual complexity of reversing the one-way functions used. QKD has provable security based on information theory, and forward secrecy. The main drawback of quantum key distribution is that it usually relies on having an authenticated classical channel of communications. In modern cryptography, having an authenticated classical channel means that one has either already exchanged a symmetric key of sufficient length or public keys of sufficient security level. With such information already available, in practice one can achieve authenticated and sufficiently secure communications without using QKD, such as by using the Galois/Counter Mode of the Advanced Encryption Standard. Thus QKD does the work of a stream cipher at many times the cost. Quantum key distribution is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen encryption algorithm to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel. The algorithm most commonly associated with QKD is the one-time pad, as it is provably secure when used with a secret, random key. In real-world situations, it is often also used with encryption using symmetric key algorithms like the Advanced Encryption Standard algorithm. (Wikipedia).

Quantum key distribution
Video thumbnail

Key Distribution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Quantum Physics Full Course | Quantum Mechanics Course

Quantum physics also known as Quantum mechanics is a fundamental theory in physics that provides a description of the physical properties of nature at the scale of atoms and subatomic particles. It is the foundation of all #quantum #physics including quantum chemistry, quantum field theory

From playlist Quantum Mechanics

Video thumbnail

Quantum Well Density of States

https://www.patreon.com/edmundsj If you want to see more of these videos, or would like to say thanks for this one, the best way you can do that is by becoming a patron - see the link above :). And a huge thank you to all my existing patrons - you make these videos possible. Perhaps almos

From playlist Quantum Mechanics

Video thumbnail

Quantum Computer in a Nutshell (Documentary)

The reservoir of possibilities offered by the fundamental laws of Nature, is the key point in the development of science and technology. Quantum computing is the next step on the road to broaden our perspective from which we currently look at the Universe. The movie shows the history of pr

From playlist Quantum computing

Video thumbnail

Quantum Theory - Full Documentary HD

Check: https://youtu.be/Hs_chZSNL9I The World of Quantum - Full Documentary HD http://www.advexon.com For more Scientific DOCUMENTARIES. Subscribe for more Videos... Quantum mechanics (QM -- also known as quantum physics, or quantum theory) is a branch of physics which deals with physica

From playlist TV Appearances

Video thumbnail

Quantum Mechanics 1.1: Introduction

In this video I provide some motivation behind the development of quantum mechanics, kicking off a new series on everything you've been wondering about quantum mechanics! Twitter: https://twitter.com/SciencePlease_

From playlist Quantum Mechanics

Video thumbnail

Quantum Mechanics Concepts: 1 Dirac Notation and Photon Polarisation

Part 1 of a series: covering Dirac Notation, the measurable Hermitian matrix, the eigenvector states and the eigenvalue measured outcomes and application to photon polarisation

From playlist Quantum Mechanics

Video thumbnail

Probability Distribution Functions

We explore the idea of continuous probability density functions in a classical context, with a ball bouncing around in a box, as a preparation for the study of wavefunctions in quantum mechanics.

From playlist Quantum Mechanics Uploads

Video thumbnail

Linear algebra for Quantum Mechanics

Linear algebra is the branch of mathematics concerning linear equations such as. linear functions and their representations in vector spaces and through matrices. In this video you will learn about #linear #algebra that is used frequently in quantum #mechanics or #quantum #physics. ****

From playlist Quantum Physics

Video thumbnail

What is Quantum Cryptography?

GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year plan + 1 additional month FREE. You can learn more about NordVPN on their YouTube channel: https://www.youtube.com/channel/UCSZhRxyloC-qzURiOa3vbFQ Note: At 7 min 52 secs "vertical

From playlist Physics

Video thumbnail

24C3: Quantum Cryptography and Possible Attacks

Speakers: Alexander Ling, Antia Lamas, Ilja Gerhardt, Christian Kurtsiefer Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distri

From playlist 24C3: Full steam ahead

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 1 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Nexus Trimester - Stephanie Wehner (Delft University of Technology)

Device-independence in quantum cryptography Stephanie Wehner (Delft University of Technology) March 22, 2016 Abstract: While quantum cryptography offers interesting security guarantees, it is challenging to build good quantum devices. In practise, we will therefore typically rely on devi

From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme

Video thumbnail

Chem 131A. Lec 04. Quantum Principles: Complementarity, Quantum Encryption, Schrodinger Equation

UCI Chem 131A Quantum Principles (Winter 2014) Lec 04. Quantum Principles -- Complementarity, Quantum Encryption, Schrodinger Equation -- View the complete course: http://ocw.uci.edu/courses/chem_131a_quantum_principles.html Instructor: A.J. Shaka, Ph.D License: Creative Commons BY-NC-SA

From playlist Chem 131A: Week 2

Video thumbnail

Why Quantum Computing Requires Quantum Cryptography

Learn more about Audible at: https://www.audible.com/spacetime or text spacetime to 500 500! PBS Member Stations rely on viewers like you. To support your local station, go to: http://to.pbs.org/DonateSPACE Quantum computing is cool, but you know what would be extra awesome - a quantum i

From playlist Space Time!

Video thumbnail

An Uncrackable Code? (Quantum Cryptography) - A Quantum Scientist Explains #QuantumMinutes

Note: at 8:55 it be should ½ x ½ = ¼ of course, not + What is Quantum Cryptography? Today's host, Dr. Lukas Knips, is a quantum researcher in the group of Prof. Harald Weinfurter at the Ludwig-Maximilians-Universität (LMU) München in Germany. His research focusses on free-space Quantum Ke

From playlist Summer of Math Exposition Youtube Videos

Video thumbnail

Quantum Cryptography | CaltechX and DelftX on edX | Course About Video

Learn how quantum communication provides security that is guaranteed by the laws of nature. Take this course free on edX: https://www.edx.org/course/quantum-cryptography-caltechx-delftx-qucryptox#! ABOUT THIS COURSE How can you tell a secret when everyone is able to listen in? In this co

From playlist Research & Science

Video thumbnail

Quantum Field Theory 2b - Field Quantization II

Here we complete the "quantum field theory" of a vibrating string. (Note: My voice is lower and slower than normal - I was coming down with a cold.) Errors: At 0:42 I say "minus c-squared times q-k..." I should have said, "minus c-squared times quantity k pi over L squared, times q-k..."

From playlist Quantum Field Theory

Video thumbnail

Adeline Roux-Langlois : Using structured variants in lattice-based cryptography - Lecture 1

CONFERENCE Recording during the thematic meeting : « Francophone Computer Algebra Days» the March 06, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Jean Petit Find this video and other talks given by worldwide mathematicians on CIRM's Audiov

From playlist Mathematical Aspects of Computer Science

Related pages

Qubit | BB84 | Stream cipher | Communication channel | Randomness | No-cloning theorem | SARG04 | QuintessenceLabs | List of quantum key distribution protocols | Institute for Quantum Computing | One-time pad | Universal hashing | Forward secrecy | Poisson distribution | Information theory | Key (cryptography) | DARPA Quantum Network | Galois/Counter Mode | One-way function | Quantum information science | Quantum Experiments at Space Scale | Orthogonality | Bit | Message authentication | Interaction-free measurement | Basis (linear algebra) | Quantum entanglement | Hardware random number generator | Decoy state | Man-in-the-middle attack | Quantum cryptography | Quantum network | Counterfactual definiteness | Random number generator attack | ID Quantique | Advanced Encryption Standard | Quantum computing