![]() ![]() If the level of eavesdropping is below a certain threshold, a key can be produced that is guaranteed to be secure (i.e., the eavesdropper has no information about it). By using quantum superpositions or quantum entanglement and transmitting information in quantum states, a communication system can be implemented that detects eavesdropping. ![]() A third party trying to eavesdrop on the key must in some way measure it, thus introducing detectable anomalies. This results from a fundamental aspect of quantum mechanics: the process of measuring a quantum system in general disturbs the system. It is often incorrectly called quantum cryptography, as it is the best-known example of a quantum-cryptographic task.Īn important and unique property of quantum key distribution is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. It enables two parties to produce a shared random secret key known only to them, which then can be used to encrypt and decrypt messages. Quantum key distribution ( QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |