Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Quantum Cryptography

2 min read
Pronunciation
[kwon-tuhm krip-tog-ruh-fee]
Analogy
Imagine sending a secret message using special 'quantum messengers' that are incredibly fragile. If anyone tries to intercept or even observe these messengers while they're in transit, the very act of observation changes them in a detectable way. This allows the sender and receiver to know if their communication has been eavesdropped upon, enabling them to establish a secret key with proven security against eavesdropping based on the laws of physics.
Definition
A field of cryptography that leverages principles of quantum mechanics to perform cryptographic tasks. Unlike Post-Quantum Cryptography (which develops classical algorithms resistant to quantum computers), Quantum Cryptography uses quantum phenomena directly, primarily for tasks like secure key distribution.
Key Points Intro
Quantum Cryptography uses quantum mechanics to achieve unconditional security for certain cryptographic tasks, most notably key distribution.
Key Points

Employs quantum phenomena like superposition and entanglement.

Its most mature application is Quantum Key Distribution (QKD).

QKD allows two parties to produce a shared random secret key known only to them, and the security is based on the laws of quantum physics (e.g., the uncertainty principle, no-cloning theorem).

Distinct from Post-Quantum Cryptography (PQC), which focuses on classical algorithms secure against quantum computers.

Example
A Quantum Key Distribution (QKD) system might use individual photons (particles of light) to transmit key information. If an eavesdropper attempts to measure these photons, they will inevitably disturb their quantum states, and this disturbance can be detected by the communicating parties, allowing them to discard the compromised key material.
Technical Deep Dive
QKD protocols like BB84 (Bennett & Brassard, 1984) or E91 (Ekert, 1991) describe how to use quantum states (e.g., polarization of photons) to establish a shared secret key. For example, in BB84, Alice sends photons randomly polarized in one of two bases (e.g., rectilinear or diagonal). Bob randomly chooses a basis to measure each incoming photon. After transmission, Alice and Bob publicly discuss (over a classical authenticated channel) which bases they used for each photon, keeping only the bits where their bases matched. They can then test for eavesdropping by comparing a subset of these shared bits. If the error rate is low, they can distill a secure key through error correction and privacy amplification.
Security Warning
While QKD offers theoretical information-theoretic security for key distribution, practical implementations face challenges such as photon loss, detector imperfections, and side-channel attacks on the physical devices. QKD systems also require an authenticated classical channel for communication. QKD does not solve all cryptographic problems (e.g., it doesn't directly provide authentication or digital signatures, which still require classical cryptography).
Caveat
Quantum cryptography, particularly QKD, is primarily focused on secure key exchange. It doesn't replace all classical cryptographic functions. For other tasks like encryption of data at rest or digital signatures, classical cryptography (including PQC for future-proofing) is still needed.

Quantum Cryptography - Related Articles

No related articles for this term.