Quantum Cryptography

Quantum cryptography is the application of quantum mechanics principles to encryption to better secure connections between two parties. It gained traction in the 1980s when Charles Bennett and Gilles Brassard introduced their quantum key distribution protocol, called BB84. Quantum key distribution uses subatomic light particles – photons – as a means of choosing a secret encryption key. Before generating the key, the two parties must interact and authenticate their identities. Then photons are sent across a cable and are randomly divided by a beam splitter. The remaining photons determine the key, which is now known only to the communicating parties.

Quantum key distribution should be used with other encryption practices for best possible security. It has failed before, but that was due to faulty implementation rather than the principles of quantum mechanics, which are reliable and consistent.

Mistrustful quantum cryptography uses different methods of creating an encrypted connection, such as coin flipping and oblivious transfer. The two parties don’t trust each other, which increases the likelihood of cheating, and it’s typically impossible to create unconditional security. Methods of mistrustful quantum cryptography should be used with other encryption methods.

The benefit of quantum cryptography is its security. Because the connection between the two parties is established using photons, any attempted breach will clearly disturb the photons. Those parties will notice anyone attempting to eavesdrop or interrupt the communication. A cryptographic connection established by physics is more secure than other encryption protocols; its security can be proven through physics principles.






Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...