Content deleted Content added
Added period. Tags: Visual edit Mobile edit Mobile web edit |
James.mafu (talk | contribs) I re-wrote the lead paragraph under the subsection on Applications. |
||
(21 intermediate revisions by 4 users not shown) | |||
Line 3:
{{Use dmy dates|date=September 2020}}
'''Quantum cryptography''' is the science of exploiting [[Quantum mechanics|quantum mechanical]] properties such as quantum entanglement, measurement disturbance, no-cloning theorem, and the principle of superposition to perform various [[cryptographic]] tasks.<ref>{{Cite journal|last1=Gisin|first1=Nicolas|last2=Ribordy|first2=Grégoire|last3=Tittel|first3=Wolfgang|last4=Zbinden|first4=Hugo|display-authors=|year=2002|title=Quantum cryptography|url=https://journals.aps.org/rmp/abstract/10.1103/RevModPhys.74.145|journal=Reviews of Modern Physics|volume=74|issue=1|pages=145–195|doi=10.1103/RevModPhys.74.145|arxiv=quant-ph/0101098|bibcode=2002RvMP...74..145G|s2cid=6979295}}</ref><ref name=":4">{{Cite journal|last1=Pirandola|first1=S.|last2=Andersen|first2=U. L.|last3=Banchi|first3=L.|last4=Berta|first4=M.|last5=Bunandar|first5=D.|last6=Colbeck|first6=R.|last7=Englund|first7=D.|last8=Gehring|first8=T.|last9=Lupo|first9=C.|last10=Ottaviani|first10=C.|last11=Pereira|first11=J. L.|display-authors=et al.|year=2020|title=Advances in quantum cryptography|url=https://www.osapublishing.org/aop/abstract.cfm?uri=aop-12-4-1012|journal=Advances in Optics and Photonics|volume=12|issue=4|pages=1012–1236|arxiv=1906.01645|doi=10.1364/AOP.361502|bibcode=2020AdOP...12.1012P|s2cid=174799187}}</ref><ref>{{Cite
== History ==
Line 14:
== Applications ==
Quantum cryptography is a general subject that covers a broad range of cryptographic practices and protocols.
The best-known and developed application of quantum cryptography is [[Quantum key distribution|QKD]], which is the process of using quantum communication to establish a shared key between two parties (Alice and Bob, for example) without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. If Eve tries to learn information about the key being established, discrepancies will arise causing Alice and Bob to notice. Once the key is established, it is then typically used for [[encrypted]] communication using classical techniques. For instance, the exchanged key could be used for [[symmetric cryptography]] (e.g. [[one-time pad]]).
Line 124 ⟶ 121:
=== Deprecation of quantum key distributions from governmental institutions ===
Because of the practical problems with quantum key distribution, some governmental organizations recommend the use of post-quantum cryptography (quantum resistant cryptography) instead. For example, the US [[National Security Agency]],<ref name="NSA">{{cite web |title=Quantum Key Distribution (QKD) and Quantum Cryptography (QC) |url=https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/ |publisher=[[National Security Agency]] |access-date=16 July 2022}} {{PD-notice}}</ref> [[European Union Agency for Cybersecurity]] of EU (ENISA),<ref>Post-Quantum Cryptography: Current state and quantum mitigation, Section 6 "Conclusion" [https://www.enisa.europa.eu/publications/post-quantum-cryptography-current-state-and-quantum-mitigation]</ref> UK's [[National Cyber Security Centre (United Kingdom)|National Cyber Security Centre]],<ref>[https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies Quantum security technologies]</ref> French Secretariat for Defense and Security (ANSSI),
For example, the US National Security Agency addresses five issues:<ref name="NSA" />
|