The basic functionality of QKD has been demonstrated in the context of large (scientific) testbeds. International standards are also available. In the meantime, there are products that work in the normal operational/technical environment. Nevertheless, quantum key distribution (QKD) has so far its l...
The Quantum Key Distribution (QKD) has limits, especially regarding distances. However, general useability has been shown in the context of large (scientific) testbeds. International standards are available. There already exist products that are suitable for normal operational/technical environments...
After 8 years of research on the methods, the first three quantum-secure PQC algorithms have now been standardized by NIST:
FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism Standard (ML-KEM) based on Crystals-Kyber
FIPS 204, Module-...
The ongoing development of quantum computers affects the security of currently used encryption and authentication schemes. Therefore, this document presents 'Post Quantum Cryptography' (PQC) and 'Quantum Key Distribution' (QKD). PQC describes software based approaches for quantum safe encryption and...
Before a new technology can be commercially used on a large scale, first some practical experience has to be obtained. This is usually done in testbeds, where commercial hardware is used under realistic conditions.
Quantum Key Distribution (QKD) facilitates the generation of common secret random nu...
The ongoing development of quantum computers endangers currently used cryptographic protocols and makes it necessary to deploy quantum secure encryption. An important step is the integration of quantum secure encryption in widely used messenger apps. As explained in a press release from 21.02.2024, ...
Since 2016 a selection process with multiple steps is ongoing where the National Institute for Standards and Technology (NIST) searches and evaluates suitable Post Quantum Cryptography (PQC) algorithms for digital signatures and encryption for standardization. This is necessary as the continuous dev...
Despite some issues there already exist practical considerations and network realizations especially regarding Metropolitan Area Networks. In the fifth part (videos 38-52) the tutorial, presents aspects regarding the coexistence with classical data and selected testbeds, including the entanglement b...
Next to the generation of quantum keys, e.g. for single-use password, their use to setup secured networks is an important topic. In the fourth part (videos 28-37) the tutorials explains how quantum secured networks are set up and presents security strategies and how keys are distributed in the netwo...
Since repeating in quantum networks is not ready for operation anytime soon, a more modest approach is needed for network construction. The remedy is smaller-scale and more tightly meshed networks in the 100 km range. This places higher demands on security and performance, especially for key generat...