Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Quantum Cryptography Basics

30

Flashcards

0/30

Still learning
StarStarStarStar

Quantum Non-Demolition Measurement

StarStarStarStar

A type of measurement in quantum mechanics which allows the measurement of a quantum system without destroying its original state.

StarStarStarStar

Decoy State Protocol

StarStarStarStar

A strategy used in quantum key distribution to detect eavesdropping by introducing additional states or pulses to disguise the actual quantum bits being transmitted.

StarStarStarStar

Grover's Algorithm

StarStarStarStar

A quantum algorithm that provides a quadratic speedup for searching an unsorted database compared to classical algorithms.

StarStarStarStar

Shor's Algorithm

StarStarStarStar

A quantum algorithm for integer factorization which would enable a quantum computer to break systems that are currently based on the difficulty of factoring large numbers, like RSA encryption.

StarStarStarStar

Heisenberg's Uncertainty Principle

StarStarStarStar

A very important concept in quantum mechanics, it states that certain pairs of physical properties of a particle, such as position and momentum, cannot be simultaneously measured and known exactly.

StarStarStarStar

No-Cloning Theorem

StarStarStarStar

A theorem in quantum mechanics that states it is impossible to create an identical copy of an arbitrary unknown quantum state.

StarStarStarStar

Quantum Entanglement

StarStarStarStar

A physical phenomenon that occurs when pairs or groups of particles are generated or interact in a way that the quantum state of each particle cannot be described independently of the others.

StarStarStarStar

Dense Coding

StarStarStarStar

A protocol that allows the transmission of two classical bits of information by sending only one qubit, using the property of quantum entanglement.

StarStarStarStar

Quantum Teleportation

StarStarStarStar

A technique for transferring quantum information from one location to another, with the help of classical communication and previously shared entanglement between the sending and the receiving location.

StarStarStarStar

Forward Secrecy

StarStarStarStar

A feature of some cryptographic protocols where a unique key is used for each session, ensuring that even if one key is compromised, previous communications remain secure.

StarStarStarStar

Quantum Channel

StarStarStarStar

The medium used to transmit quantum bits between parties in a quantum communication system, typically optical fibers or free space.

StarStarStarStar

Bell Test Experiments

StarStarStarStar

Experiments designed to demonstrate the real effects of quantum entanglement and to rule out local hidden variable theories by violating Bell's inequality.

StarStarStarStar

Quantum Cryptanalysis

StarStarStarStar

The study of how quantum algorithms can be used to break cryptographic codes and security systems, which is especially relevant with the rise of quantum computing.

StarStarStarStar

Uncertainty Principle

StarStarStarStar

In quantum mechanics, the principle that certain pairs of physical properties, like position and momentum, cannot both be known to arbitrary precision.

StarStarStarStar

Eavesdropping Detection

StarStarStarStar

The quantum cryptography process of checking for third-party presence during the key exchange process because any measurement will disturb the quantum system.

StarStarStarStar

Photonic Qubits

StarStarStarStar

Quantum bits that use the quantum states of photons to represent the 0s and 1s of binary data, commonly used in quantum key distribution.

StarStarStarStar

Post-Quantum Cryptography

StarStarStarStar

Cryptographic algorithms that are thought to be secure against an attack by a quantum computer, based on problems that have no known efficient solution by a quantum algorithm.

StarStarStarStar

Quantum Key Distribution (QKD)

StarStarStarStar

A secure communication method which uses quantum mechanics to generate and distribute a cryptographic key.

StarStarStarStar

Privacy Amplification

StarStarStarStar

A method that allows two parties to distill a secret key from a common shared but partially secret random variable, removing partial information that might be known to an eavesdropper.

StarStarStarStar

Quantum Key Growing

StarStarStarStar

The technique of expanding a short, initial quantum-secure key into a longer key that can be used for encryption or other cryptographic purposes.

StarStarStarStar

BB84 Protocol

StarStarStarStar

First and one of the most famous QKD protocols proposed by Charles Bennett and Gilles Brassard in 1984, which uses polarized photons to transmit information.

StarStarStarStar

Quantum Repeater

StarStarStarStar

A device used in quantum communications to extend the distance over which quantum cryptography can be used, without degradation of the quantum signal.

StarStarStarStar

Quantum Direct Communication

StarStarStarStar

The transfer of information in quantum states directly from sender to receiver, without the need for a shared secret beforehand and with the security provided by the laws of quantum mechanics.

StarStarStarStar

Quantum Secure Direct Communication (QSDC)

StarStarStarStar

A form of secure communication where quantum mechanics ensures that information is transmitted directly between parties, without being decrypted along the channel.

StarStarStarStar

Quantum Bit (qubit)

StarStarStarStar

The basic unit of quantum information, representing a two-state (or two-level) quantum-mechanical system, such as the polarization direction of a photon.

StarStarStarStar

Quantum Error Correction

StarStarStarStar

The process of protecting quantum information from errors due to decoherence and other quantum noise, essential for the operation of quantum computers and communication systems.

StarStarStarStar

Quantum Random Number Generation

StarStarStarStar

The generation of truly random numbers based on the inherent unpredictability in the measurement of quantum systems, providing a high level of security for cryptographic protocols.

StarStarStarStar

Superposition

StarStarStarStar

A fundamental principle of quantum mechanics that allows particles like atoms and electrons to be in multiple states or places at the same time

StarStarStarStar

Bennett-Brassard-Mermin 1992 (BBM92)

StarStarStarStar

A quantum key distribution protocol which is a modification of the BB84 protocol, using entangled photon pairs instead of single photons.

StarStarStarStar

Quantum Networks

StarStarStarStar

Networks that use quantum signals or entanglement to connect devices and transmit information, forming the basis for a future quantum internet.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.