Quantum Cryptography
Secure keys through
the laws of physics
Quantum Key Distribution lets two parties establish a shared secret key over an insecure channel - and mathematically guarantees that any eavesdropper will leave a detectable trace.
01 Foundations & Principles
02 Comparison to PKC
03 QKD Protocols
04 BB84 Protocol
05 Live Demo
06 Future Outlook & Alternatives
01
Foundations and Principles
Quantum Mechanical Principles
- Measurement Disturbance Principle
- No-Cloning Theorem
- Superposition
- Entanglement
Core Goals
- Produce a shared random secret key
- Use that key for secure message encryption
Security Mechanism
- Eavesdropping detection
- Abort key if intrusion is detected
- Information-theoretic security (laws of physics)
- Authenticated classical channel
02
Comparison to Public Key Cryptography
PKC
- Relies on mathematical computational difficulty
- Vulnerable to quantum computers
- Eavesdropping is undetectable
QKD Advantages
- Information-theoretic security (physics-based)
- Resistant to quantum computer attacks
- Immediate eavesdropping detection
03
QKD Protocols
BB84 Protocol
Coherent · Decoy-State
E91 Protocol
BBM92 Protocol
Measurement Device Independent QKD
Device Independent QKD
Twin-Field QKD
Counterfactual QKD
Quantum Secret Sharing Protocol
Kak's Three-Stage Protocol
Continuous Variable QKD
Discrete Variable QKD
SARG04 Protocol
Coherent One Way Protocol
Distributed Phase Shifting Protocol
Round Robin (RR) Protocol
Semi-QKD
Quantum Conference Key Distribution Protocol
06
Future Outlook and Alternatives
Primary Alternative - PQC
- Classical implementation - no special hardware needed
- Functional completeness - handles authentication and more
- Lower cost and easier deployment at scale
Governmental Position & QKD Depreciation
- Reliance on trusted nodes / relays
- High cost and specialization
- Security is implementation-dependent
- Currently niche application status
Future Outlook
- Overcoming distance limitations via quantum repeaters
- Future research challenges for network security