Fiveable

⚛️Intro to Quantum Mechanics I Unit 13 Review

QR code for Intro to Quantum Mechanics I practice questions

13.3 Quantum key distribution and cryptography

13.3 Quantum key distribution and cryptography

Written by the Fiveable Content Team • Last updated August 2025
Written by the Fiveable Content Team • Last updated August 2025
⚛️Intro to Quantum Mechanics I
Unit & Topic Study Guides

Quantum key distribution and cryptography are game-changers in secure communication. They use quantum mechanics to create unbreakable codes and detect eavesdroppers. It's like having a secret language that only you and your friend understand.

These techniques are revolutionizing how we keep information safe. From the BB84 protocol to entanglement-based methods, quantum cryptography is paving the way for ultra-secure communication in our increasingly connected world.

Quantum Key Distribution Protocols

BB84 Protocol and QKD Fundamentals

  • BB84 protocol establishes a secure key between two parties using quantum states of photons
  • Utilizes four quantum states corresponding to vertical, horizontal, and diagonal polarizations of photons
  • Sender (Alice) randomly chooses between two bases to encode bits, while receiver (Bob) randomly selects measurement basis
  • After measurements, Alice and Bob publicly compare chosen bases, discarding mismatched results
  • Remaining matched results form the raw key, which undergoes further processing to create the final secure key
  • Quantum key distribution (QKD) encompasses various protocols, including BB84, for generating secure cryptographic keys
  • QKD leverages quantum mechanical principles to detect any eavesdropping attempts during key exchange

Entanglement-Based Protocols

  • Entanglement-based protocols exploit quantum entanglement for secure key distribution
  • Utilize pairs of entangled particles, typically photons, shared between Alice and Bob
  • Ekert protocol (E91) represents a prominent entanglement-based QKD scheme
  • Alice and Bob perform measurements on their respective entangled particles using randomly chosen bases
  • Correlations between measurement outcomes form the basis for generating the secure key
  • Bell's inequality test verifies the presence of quantum entanglement and detects potential eavesdropping
  • Entanglement-based protocols offer advantages in long-distance quantum communication (satellite-based QKD)

Quantum Secure Direct Communication

  • Quantum secure direct communication (QSDC) enables direct transmission of secret messages without prior key distribution
  • Utilizes quantum states to encode information, ensuring security through quantum mechanical principles
  • Ping-pong protocol represents a well-known QSDC scheme
  • Involves back-and-forth transmission of quantum states between communicating parties
  • Sender encodes message bits onto the quantum states using specific operations
  • Receiver performs measurements to extract the encoded information
  • QSDC protocols often employ quantum error correction and privacy amplification techniques
  • Offers potential advantages in scenarios requiring immediate secure communication without key exchange
BB84 Protocol and QKD Fundamentals, Optimizing the decoy-state BB84 QKD protocol parameters | Quantum Information Processing

Quantum Cryptography Foundations

No-Cloning Theorem and Its Implications

  • No-cloning theorem states that it is impossible to create an identical copy of an unknown quantum state
  • Fundamental principle underlying the security of quantum cryptography
  • Prevents eavesdroppers from creating perfect copies of intercepted quantum states
  • Any attempt to measure or copy a quantum state inevitably disturbs it, revealing the presence of an eavesdropper
  • Applies to arbitrary quantum states, including superposition states used in quantum cryptography
  • Crucial for ensuring the security of quantum key distribution protocols
  • Contrasts with classical information, which can be perfectly copied without detection

Quantum Random Number Generation

  • Quantum random number generators (QRNGs) produce truly random numbers based on quantum mechanical processes
  • Utilize quantum phenomena such as radioactive decay or photon detection to generate randomness
  • Offer advantages over classical pseudorandom number generators in terms of unpredictability and security
  • Beam splitter-based QRNG sends photons through a 50/50 beam splitter, generating random bits based on detected paths
  • Vacuum fluctuation-based QRNG measures quantum noise in the electromagnetic vacuum to generate random numbers
  • QRNGs find applications in cryptography, scientific simulations, and gambling industries
  • Provide a reliable source of randomness for initializing quantum cryptographic protocols

Post-Quantum Cryptography Advancements

  • Post-quantum cryptography develops classical cryptographic systems resistant to attacks by quantum computers
  • Addresses potential vulnerabilities of current public-key cryptosystems to quantum algorithms (Shor's algorithm)
  • Lattice-based cryptography utilizes mathematical problems related to lattices, believed to be quantum-resistant
  • Code-based cryptography relies on the difficulty of decoding general linear codes
  • Multivariate cryptography employs systems of multivariate polynomial equations over finite fields
  • Hash-based signatures leverage the security of cryptographic hash functions for digital signatures
  • Isogeny-based cryptography utilizes the complexity of finding isogenies between elliptic curves
  • National Institute of Standards and Technology (NIST) leads efforts to standardize post-quantum cryptographic algorithms
Pep mascot
Upgrade your Fiveable account to print any study guide

Download study guides as beautiful PDFs See example

Print or share PDFs with your students

Always prints our latest, updated content

Mark up and annotate as you study

Click below to go to billing portal → update your plan → choose Yearly → and select "Fiveable Share Plan". Only pay the difference

Plan is open to all students, teachers, parents, etc
Pep mascot
Upgrade your Fiveable account to export vocabulary

Download study guides as beautiful PDFs See example

Print or share PDFs with your students

Always prints our latest, updated content

Mark up and annotate as you study

Plan is open to all students, teachers, parents, etc
report an error
description

screenshots help us find and fix the issue faster (optional)

add screenshot

2,589 studying →