Explore quantum-secure communication and the future of cryptography
QKD uses quantum mechanics to detect eavesdropping and establish provably secure communication channels. Any attempt to intercept the quantum states will disturb them, alerting the communicating parties.
The BB84 protocol, developed by Bennett and Brassard in 1984, is the first quantum key distribution protocol.
Quantum computers pose a significant threat to current cryptographic systems, particularly those based on integer factorization and discrete logarithms.
Status: vulnerable
Broken by Shor's algorithm
Status: vulnerable
Broken by Shor's algorithm
Status: Weakened
Grover's algorithm halves key strength
Post-quantum cryptography develops algorithms that remain secure against both classical and quantum computers.
NIST begins post-quantum standardization process
First standards published: CRYSTALS-Kyber, CRYSTALS-Dilithium
Additional standards: ML-KEM, ML-DSA, slH-DSA
Widespread adoption and implementation
Example: CRYSTALS-Kyber
Key exchange
Example: SPHINCS+
Digital signatures
Example: Classic McEliece
Key encapsulation