QSNP

Classical communication

Classical communication encryption protocols are mostly based on the RSA algorithm.

In this method, there are 2 parties and there are 2 keys that are generated:

  • A public key that is sent to one party.
  • A private key that remains with the other party.
  • The message is encrypted using the public key and opened with the private key.

The security of this method relies on that the private key is secret and only the party receiving the message has access to it.

The public/private keys are created using different mathematical algorithms, the most famous is based on factorization of a large number into primes and it is known as RSA.

It is quick to multiply two very large numbers, but it takes a lot more time to factorize a large number into prime factors. To hack RSA and obtain the private key from the public key we would need to be able to factorize a very large number with more than 600 digits.

  • No algorithm or machine is known today that is able to do such thing.
  • It would take more than a million years of computation time to solve

What can Quantum Cryptography do to solve this issue?

Classical communication

Quantum communication

Quantum Cryptography

Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. This could be used to detect eavesdropping in quantum key distribution (QKD).

Next Generation Protocols

Several protocols have been established these last years in trying to secure the information being transmitter over the internet. Quantum Key Distribution (QKD) is a one of the most common protocols established so far that guarantees this ultra-secure layer of protection by implementing a cryptographic protocol involving components of quantum mechanics. The protocol allows two parties to produce a shared random secret key known only to them, which then can be used to encrypt and decrypt messages. If anyone tries to intercept the message, the system detects it and alerts the users that there is someone trying to hack the communication. The key is destroyed immediately and a new one is produced and shared again amongst the parties.

Quantum communication

Learn more about