Overview
ABSTRACT
This article presents the basic principles of quantum cryptography and a brief introduction to quantum key distribution (QKD). It describes the risks inherent in currently deployed cryptography techniques used in quantum computing and raises some questions: When will quantum computers be operational? Should we deploy QKD today, and how should we go about improving existing cryptography (doubling key size, replacing protocols, mixing with QKD)? These issues are discussed here with respect to QKD standardization. Standardization is an option for dealing with these issues, offering the required working framework to develop the functional standards, components, operational conditions (metrology) and tests needed for quality assurance of future security-enhancing cryptography techniques.
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHOR
-
Patrick René GUILLEMIN: Innovation, Research and Standardization Technical Officer – ETSI - European Telecommunications Standards Institute / Institut européen des normes de télécommunications, Sophia Antipolis, France
INTRODUCTION
This article is the updated 2023 version of article H 5 214 entitled
"Quantum Key Distribution QKD (DQC)", written in 2015,
which in turn updated the 2008 article
This article introduces Quantum Key Distribution (QKD) as seen through the lens of QKD and QSC (Quantum Safe Cryptography) standardization led by the ETSI (European Telecommunications Standards Institute), which has 910 members in 60 countries and is developing the world's mobile telephony standards (GSM, 4G, 5G).
Cryptography is a competition between those responsible for the security of critical information systems (governmental, military, industrial, financial, medical) and hackers, who can be enemies, competitors, investigators, computer experts with malicious intentions, or sometimes just people who like to take on challenges and share their results on the Internet.
The challenge is to secure data communications and information stored (encrypted) in databases. This critical information needs long-term security. Indeed, thanks to the gigantic storage capacities available at low cost, encrypted data communications considered secure today can be stored and decrypted at a later date. The risk of decryption increases...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
KEYWORDS
distribution | cryptography | quantum |
EDITIONS
Other editions of this article are available:
Quantum Key Distribution QKD (DQC)
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!