402 research outputs found
Quantum Key Distribution
This chapter describes the application of lasers, specifically diode lasers,
in the area of quantum key distribution (QKD). First, we motivate the
distribution of cryptographic keys based on quantum physical properties of
light, give a brief introduction to QKD assuming the reader has no or very
little knowledge about cryptography, and briefly present the state-of-the-art
of QKD. In the second half of the chapter we describe, as an example of a
real-world QKD system, the system deployed between the University of Calgary
and SAIT Polytechnic. We conclude the chapter with a brief discussion of
quantum networks and future steps.Comment: 20 pages, 12 figure
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Making Existing Software Quantum Safe: Lessons Learned
In the era of quantum computing, Shor's algorithm running on quantum
computers (QCs) can break asymmetric encryption algorithms that classical
computers essentially cannot. QCs, with the help of Grover's algorithm, can
also speed up the breaking of symmetric encryption algorithms. Though the exact
date when QCs will become "dangerous" for practical problems is unknown, the
consensus is that this future is near. Thus, one needs to start preparing for
the era of quantum advantage and ensure quantum safety proactively.
In this paper, we discuss the effect of quantum advantage on the existing
software systems and recap our seven-step roadmap, deemed 7E. The roadmap gives
developers a structured way to start preparing for the quantum advantage era.
We then report the results of a case study, which validates 7E. Our software
under study is the IBM Db2 database system, where we upgrade the existing
cryptographic schemes to post-quantum cryptography (using Kyber and Dilithium
schemes) and report our findings and learned lessons. The outcome of the study
shows that the 7E roadmap is effective in helping to plan the evolution of
existing software security features towards quantum safety
- …