An explanation of quantum key distribution

<p><i>In this video, Informa TechTarget managing editor Kate Murray explains how quantum key distribution uses physics principles to create more secure cryptographic keys that classic computing can’t hack.</i></p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Keep your secret keys secret, with quantum key distribution.</p>
<p>Modern <a href=”https://www.techtarget.com/searchsecurity/definition/encryption”>encryption</a> is a critical part of cybersecurity. It relies on powerful mathematical algorithms to scramble the data before it’s sent out on a network, or to keep precious data secured while it’s at rest on a storage system.</p>
<p>These mathematical algorithms perform their calculations based on a unique code or sequence of characters called a <a href=”https://www.techtarget.com/searchsecurity/definition/key”>cryptographic key</a>. Not only is data scrambled in accordance with the key, but the key is also needed to reverse the encryption process and unscramble data back into a readable form.</p>
<p>But key distribution and management can pose real problems for encryption. The emergence of quantum computing has opened a vital new field of quantum encryption, which requires the use of quantum key distribution (<a href=”https://www.techtarget.com/searchsecurity/definition/quantum-key-distribution-QKD”>QKD</a>) technology.</p>
<p>Here, we’re going to talk about how quantum key distribution fits in with modern cryptographic and cybersecurity concerns.</p>
<p>The ideas behind quantum key distribution are the same as traditional cryptography: Cryptographic keys are produced and shared between participating parties, allowing encrypted data to be decrypted into a readable form.</p>
<p>But quantum key distribution employs the laws of quantum physics, such as <a href=”https://www.techtarget.com/searchcio/definition/quantum-entanglement”>quantum entanglement</a> and the Heisenberg uncertainty principle, instead of classical computations on a traditional computer.</p>
<p>Quantum key distribution is based on several important concepts:</p>
<ul class=”defaul

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: