Quantum Key Distribution and how it works
from

Quantum Key Distribution and how it works

Since I am looking into Quantum Key Distribution (QKD), my company approached me to write some blogs explaining the new technology for an average reader. Not a small feat for an engineer used to communicate with experts, but nonetheless I gave it a try. Technology articles tend to be dull, but the aim here is to provide a bit of fun reading. As of June-25, three articles have been published by Juniper.

If you are looking for a light-hearted introduction into Quantum Key Distribution, here is the place to start:

  1. An insight into which problem QKD attempts to address: Solving the Quantum Security Problem
  2. Distinguishing Quantum Key Distribution from Quantum Computing: Quantums in Computing and Encryption - are they the same?
  3. Looking under the hood of Quantum Key Distribution: Quantum Key Distribution (QKD) - how does it actually work?

要查看或添加评论,请登录

Gert Grammel的更多文章

  • GSMA Whitepapers published

    GSMA Whitepapers published

    The GSM Association recently published two new Whitepapers: 1. PQ.

    1 条评论
  • About the small changes that led to incompatibility between Kyber and ML-KEM

    About the small changes that led to incompatibility between Kyber and ML-KEM

    Following up on my earlier post about Google's implementation of ML-KEM in Chrome. There I highlighted a statement in…

    1 条评论
  • Google's bold Move to PQC

    Google's bold Move to PQC

    In a bold move, Google Chrome announced it is switching to PQC in Chome131 : https://www.linkedin.

    2 条评论
  • About Quantum Teleportation and Semantic Communication

    About Quantum Teleportation and Semantic Communication

    Quantum Teleportation describes an effect whereby the state of one particle is “teleported” to a distant particle in…

    1 条评论
  • How far away are we from RSA-Doomsday?

    How far away are we from RSA-Doomsday?

    Today, I tried to gain a little insight into the current state of quantum computing and worked on a "smell-test". The…

    9 条评论
  • regreSSHion coming

    regreSSHion coming

    Today I stumbled upon this interesting blog of Bharat Jogi: regreSSHion: Remote Unauthenticated Code Execution…

    1 条评论
  • More about the Complexity of Post Quantum Cryptography

    More about the Complexity of Post Quantum Cryptography

    in my last post I presented a little study discussing the complexity of implementing Post Quantum Cryptography #PQC…

    1 条评论
  • About the Complexity of Post Quantum Cryptography

    About the Complexity of Post Quantum Cryptography

    In her recent article Roberta Faux wrote about "Navigating the Post-Quantum Cryptography Minefield" which is as usual…

  • Of Digital-Sharks, CRQCodiles and PQC-Turtles

    Of Digital-Sharks, CRQCodiles and PQC-Turtles

    Most telecom experts advocate swiftly transitioning to #PostQuantumAlgorithms to safeguard customer data from quantum…

  • Feel-well Encryption?

    Feel-well Encryption?

    Nowadays it appears that "encryption" became a byword for "privacy" "confidentiality" and "security". In other words…

    4 条评论

社区洞察

其他会员也浏览了