To use this website optimally, you will need to upgrade your browser.

For more information, visit: browsehappy.com

Secure Communications

Keeping your data safe 

Secure communication

A quantum internet uses quantum bits (qubits). These offer a key advantage: they cannot be measured (read, copied, or intercepted) without being altered. Any attempt to read or intercept information encoded by the qubits is detectable.  

The quantum internet relies on this inherent cryptography and protection, to exchange encryption keys safely, via a technique known as quantum key distribution (QKD). This uses quantum mechanics to distribute a key between two users on the quantum network, which they can then use to encrypt and decrypt their sensitive messages. Although both encryption and decryption use conventional crypto algorithms, the key itself is created using the laws of quantum mechanics, so it cannot be intercepted. The result is encryption that is resistant to cyber-attacks.

There are many QKD methods, and the two most important ones are described below.

QKD - preparation and measure

The first method, referred to as prepare and measure, relies on a quantum mechanical feature - namely that measuring a qubit (information) changes its state. 

Keys are exchanged as follows:

  • prepares a qubit in a certain state and sends it to B,
  • measures the qubit to determine its prepared state.
  • If an eavesdropper measures the qubit in transit from A to B, this compromises the key, changing the state of the qubit, which A and B can detect.
  • Compromised keys are thrown out, and only keys exchanged securely are kept.

QKD is already in use with the prepare and measure method. In Switzerland, for instance, it is being used to secure the networks where election votes are counted and stored.

QKD - measurement-device independent

The second important QKD method is referred to as measurement-device independent (MDI). It relies on another quantum mechanical feature known as entanglement. MDI-QKD is considered among the upcoming generation of secure quantum communication.

  • A and B each prepare a qubit, as in prepare-and-measure QKD.
  • Each sends their qubit over a quantum network to a central node that entangles them.
  • The key is created thanks to the entanglement established.

A great advantage of MDI-QKD is its scalability since it operates over a central node. By contrast, prepare-and-measure QKD can connect only two users at a time. MDI-QKD’s central node can connect many users at once, and each user can create a key with any other user. Data moving between any two users is neither available nor known to the central node, which makes attacks to the central node futile.

All QKD methods can expose eavesdropping attempts thanks to the quantum nature of qubits. In MDI-QKD, eavesdropping affects the entanglement and allows A and B to detect if the key is compromised and the connection insecure. MDI-QKD also ensures safe key exchange when measurement devices used to measure the entanglement are tampered with - hence the name ‘measurement-device independent’.

A secure quantum internet

A quantum internet promises to offer secure key distribution for secure communications and data transfers, using the laws of quantum mechanics. It is this level of cyber security that makes future communications over quantum networks so appealing.

MDI-QKD

The next step in quantum cryptography

Engineers from QuTech can provide untappable communication that is cost-scaling to many users by using measurement-device independent (MDI) quantum key distribution (QKD). 

(If the video isn't working, click the link below it to watch on YouTube)