<p><i>In this video, Informa TechTarget managing editor Kate Murray explains how quantum key distribution uses physics principles to create more secure cryptographic keys that classic computing can’t hack.</i></p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Keep your secret keys secret, with quantum key distribution.</p>
<p>Modern <a href=”https://www.techtarget.com/searchsecurity/definition/encryption”>encryption</a> is a critical part of cybersecurity. It relies on powerful mathematical algorithms to scramble the data before it’s sent out on a network, or to keep precious data secured while it’s at rest on a storage system.</p>
<p>These mathematical algorithms perform their calculations based on a unique code or sequence of characters called a <a href=”https://www.techtarget.com/searchsecurity/definition/key”>cryptographic key</a>. Not only is data scrambled in accordance with the key, but the key is also needed to reverse the encryption process and unscramble data back into a readable form.</p>
<p>But key distribution and management can pose real problems for encryption. The emergence of quantum computing has opened a vital new field of quantum encryption, which requires the use of quantum key distribution (<a href=”https://www.techtarget.com/searchsecurity/definition/quantum-key-distribution-QKD”>QKD</a>) technology.</p>
<p>Here, we’re going to talk about how quantum key distribution fits in with modern cryptographic and cybersecurity concerns.</p>
<p>The ideas behind quantum key distribution are the same as traditional cryptography: Cryptographic keys are produced and shared between participating parties, allowing encrypted data to be decrypted into a readable form.</p>
<p>But quantum key distribution employs the laws of quantum physics, such as <a href=”https://www.techtarget.com/searchcio/definition/quantum-entanglement”>quantum entanglement</a> and the Heisenberg uncertainty principle, instead of classical computations on a traditional computer.</p>
<p>Quantum key distribution is based on several important concepts:</p>
<ul class=”defaul
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: