Quantum Key Distribution (QKD)
What is Quantum Key Distribution (QKD)?
Quantum Key Distribution (QKD)A method that uses quantum-mechanical properties of photons to let two parties share a secret key while detecting any eavesdropper on the channel.
Quantum Key Distribution (QKD) lets two parties, classically called Alice and Bob, derive a shared symmetric key whose secrecy is guaranteed by quantum physics rather than computational hardness. Single photons or entangled pairs are sent over fiber or free space, and any measurement by an eavesdropper disturbs the quantum state, introducing detectable errors. The most cited protocol is BB84 (Bennett and Brassard, 1984); newer variants include E91, B92, and measurement-device-independent (MDI) QKD. QKD complements but does not replace classical cryptography: it requires authenticated classical channels, dedicated hardware, and is currently distance-limited, so it is mainly deployed for high-value links between data centers, financial centers, or government sites.
● Examples
- 01
A BB84 link between two banks over a dedicated dark fiber pair.
- 02
Trusted-node QKD networks like the Beijing-Shanghai backbone.
● Frequently asked questions
What is Quantum Key Distribution (QKD)?
A method that uses quantum-mechanical properties of photons to let two parties share a secret key while detecting any eavesdropper on the channel. It belongs to the Cryptography category of cybersecurity.
What does Quantum Key Distribution (QKD) mean?
A method that uses quantum-mechanical properties of photons to let two parties share a secret key while detecting any eavesdropper on the channel.
How does Quantum Key Distribution (QKD) work?
Quantum Key Distribution (QKD) lets two parties, classically called Alice and Bob, derive a shared symmetric key whose secrecy is guaranteed by quantum physics rather than computational hardness. Single photons or entangled pairs are sent over fiber or free space, and any measurement by an eavesdropper disturbs the quantum state, introducing detectable errors. The most cited protocol is BB84 (Bennett and Brassard, 1984); newer variants include E91, B92, and measurement-device-independent (MDI) QKD. QKD complements but does not replace classical cryptography: it requires authenticated classical channels, dedicated hardware, and is currently distance-limited, so it is mainly deployed for high-value links between data centers, financial centers, or government sites.
How do you defend against Quantum Key Distribution (QKD)?
Defences for Quantum Key Distribution (QKD) typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Quantum Key Distribution (QKD)?
Common alternative names include: QKD, Quantum cryptography (key exchange).
● Related terms
- cryptography№ 086
BB84 Protocol
The first quantum key distribution protocol, proposed by Bennett and Brassard in 1984, which encodes random bits on photon polarization states.
- cryptography№ 465
Harvest Now, Decrypt Later
An attack strategy where adversaries record encrypted traffic today to decrypt it once cryptographically relevant quantum computers become available.
- cryptography№ 244
Cryptographic Agility
The property of a system that lets it replace cryptographic algorithms, parameters, or keys quickly and safely when threats or standards change.
- cryptography№ 846
Post-Quantum Cryptography
Classical cryptographic algorithms designed to remain secure against attacks by both classical and large-scale quantum computers.