Exploring Quantum Key Distribution

The first time I heard about the application of Quantum physics in cryptography outside of physics labs was when Swiss election authorities used quantum cryptography, or more specifically Quantum Key Distribution (QKD), to protect ballots cast in the 2007 parliamentary elections of the Geneva region.

Wikipedia defines QKD as follows:

QKD describes the process of using quantum communication to establish a shared key between two parties (usually called Alice and Bob) without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. This is achieved by Alice encoding the bits of the key as quantum data and sending them to Bob; if Eve tries to learn these bits, the messages will be disturbed and Alice and Bob will notice. The key is then typically used for encrypted communication.

So the key (pardon the pun!) difference between more traditional cryptography and QKD is that while security in the former is achieved based on the assumption that the attacker won’t be able to solve a mathematical problem (e.g. prime factorization in case of RSA), QKD relies on laws of quantum physics to achieve security. Basically, even if an attacker manages to intercept communications, it will inevitably leave a trace and hence alert the other parties to the intercept. This makes the traditional man in the attacks a thing of the past.

You might be wondering why this seemingly great technology is not more widespread. A big part of the answer is really the engineering challenge and infrastructure requirements inherent to quantum cryptography. Use of photons to share keys between parties in QKD necessitates use of dedicated fiber optic line between the two. In addition to that, instability of quantum states in entangled photons limits on the maximum usable distance of these lines, at least with today’s technology.

Then again, as with any cutting edge technology, there are challenges to solve and as long as there is a commercial interest in “unbreakable” encryption, all problems are solvable. In that regard, the QKD industry is attracting capital investments and over the next couple of years we will see much more commercial as well as R&D focused developments in this area, particularly in Europe and North America. Case in point, Ohio-based Battelle Memorial Institute in cooperation with ID Quantique (the QKD vendor that helped with Swiss elections) is developing one of the largest such key distribution networks around Columbus, OH and is planning to use quantum repeaters to mitigate the range limitations.

Read more about this very recent development at Fortune.

Previous Post
The Million Dollar Question
Next Post
Almost Famous

Related Posts


Bitcoin, the first and most successful virtual currency has had an impressive year. Not only did its exchange value rocket up to over $1000 US, but also it expanded outside the world of online shopping into brick and mortar stores.…

Security Measures to Think About

Everyone is weary of hackers and the damages that they can cause, as seen with the Heartbleed Bug and Shellshock Bash. But hacking attacks can also mean physical security breaches, as hackers do not always have to resort to intricate…

The Dark Side of Encryption

I know it’s very tedious these days to use a Star Wars metaphor, but as everyone’s doing it so will I. Encryption techniques have been used for some time to secure communications and protect personal or intellectual property. (more…)

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.