Quantum Cryptography

Quantum cryptography is the application of quantum mechanics principles to encryption to better secure connections between two parties. It gained traction in the 1980s when Charles Bennett and Gilles Brassard introduced their quantum key distribution protocol, called BB84. Quantum key distribution uses subatomic light particles – photons – as a means of choosing a secret encryption key. Before generating the key, the two parties must interact and authenticate their identities. Then photons are sent across a cable and are randomly divided by a beam splitter. The remaining photons determine the key, which is now known only to the communicating parties.

Quantum key distribution should be used with other encryption practices for best possible security. It has failed before, but that was due to faulty implementation rather than the principles of quantum mechanics, which are reliable and consistent.

Mistrustful quantum cryptography uses different methods of creating an encrypted connection, such as coin flipping and oblivious transfer. The two parties don’t trust each other, which increases the likelihood of cheating, and it’s typically impossible to create unconditional security. Methods of mistrustful quantum cryptography should be used with other encryption methods.

The benefit of quantum cryptography is its security. Because the connection between the two parties is established using photons, any attempted breach will clearly disturb the photons. Those parties will notice anyone attempting to eavesdrop or interrupt the communication. A cryptographic connection established by physics is more secure than other encryption protocols; its security can be proven through physics principles.






Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Embedded Analytics

Embedded analytics brings self-service business intelligence to everyday application users.

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their workforce operations. They provide a central platform for human resources professionals...

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...