Explore tens of thousands of sets crafted by our community.
Quantum Cryptography Basics
30
Flashcards
0/30
Quantum Teleportation
A technique for transferring quantum information from one location to another, with the help of classical communication and previously shared entanglement between the sending and the receiving location.
Quantum Repeater
A device used in quantum communications to extend the distance over which quantum cryptography can be used, without degradation of the quantum signal.
Photonic Qubits
Quantum bits that use the quantum states of photons to represent the 0s and 1s of binary data, commonly used in quantum key distribution.
Heisenberg's Uncertainty Principle
A very important concept in quantum mechanics, it states that certain pairs of physical properties of a particle, such as position and momentum, cannot be simultaneously measured and known exactly.
Quantum Key Distribution (QKD)
A secure communication method which uses quantum mechanics to generate and distribute a cryptographic key.
Quantum Secure Direct Communication (QSDC)
A form of secure communication where quantum mechanics ensures that information is transmitted directly between parties, without being decrypted along the channel.
Bennett-Brassard-Mermin 1992 (BBM92)
A quantum key distribution protocol which is a modification of the BB84 protocol, using entangled photon pairs instead of single photons.
Quantum Entanglement
A physical phenomenon that occurs when pairs or groups of particles are generated or interact in a way that the quantum state of each particle cannot be described independently of the others.
Eavesdropping Detection
The quantum cryptography process of checking for third-party presence during the key exchange process because any measurement will disturb the quantum system.
Quantum Channel
The medium used to transmit quantum bits between parties in a quantum communication system, typically optical fibers or free space.
BB84 Protocol
First and one of the most famous QKD protocols proposed by Charles Bennett and Gilles Brassard in 1984, which uses polarized photons to transmit information.
Grover's Algorithm
A quantum algorithm that provides a quadratic speedup for searching an unsorted database compared to classical algorithms.
No-Cloning Theorem
A theorem in quantum mechanics that states it is impossible to create an identical copy of an arbitrary unknown quantum state.
Forward Secrecy
A feature of some cryptographic protocols where a unique key is used for each session, ensuring that even if one key is compromised, previous communications remain secure.
Dense Coding
A protocol that allows the transmission of two classical bits of information by sending only one qubit, using the property of quantum entanglement.
Quantum Key Growing
The technique of expanding a short, initial quantum-secure key into a longer key that can be used for encryption or other cryptographic purposes.
Quantum Networks
Networks that use quantum signals or entanglement to connect devices and transmit information, forming the basis for a future quantum internet.
Quantum Bit (qubit)
The basic unit of quantum information, representing a two-state (or two-level) quantum-mechanical system, such as the polarization direction of a photon.
Quantum Cryptanalysis
The study of how quantum algorithms can be used to break cryptographic codes and security systems, which is especially relevant with the rise of quantum computing.
Quantum Random Number Generation
The generation of truly random numbers based on the inherent unpredictability in the measurement of quantum systems, providing a high level of security for cryptographic protocols.
Privacy Amplification
A method that allows two parties to distill a secret key from a common shared but partially secret random variable, removing partial information that might be known to an eavesdropper.
Superposition
A fundamental principle of quantum mechanics that allows particles like atoms and electrons to be in multiple states or places at the same time
Quantum Non-Demolition Measurement
A type of measurement in quantum mechanics which allows the measurement of a quantum system without destroying its original state.
Quantum Direct Communication
The transfer of information in quantum states directly from sender to receiver, without the need for a shared secret beforehand and with the security provided by the laws of quantum mechanics.
Quantum Error Correction
The process of protecting quantum information from errors due to decoherence and other quantum noise, essential for the operation of quantum computers and communication systems.
Post-Quantum Cryptography
Cryptographic algorithms that are thought to be secure against an attack by a quantum computer, based on problems that have no known efficient solution by a quantum algorithm.
Uncertainty Principle
In quantum mechanics, the principle that certain pairs of physical properties, like position and momentum, cannot both be known to arbitrary precision.
Bell Test Experiments
Experiments designed to demonstrate the real effects of quantum entanglement and to rule out local hidden variable theories by violating Bell's inequality.
Decoy State Protocol
A strategy used in quantum key distribution to detect eavesdropping by introducing additional states or pulses to disguise the actual quantum bits being transmitted.
Shor's Algorithm
A quantum algorithm for integer factorization which would enable a quantum computer to break systems that are currently based on the difficulty of factoring large numbers, like RSA encryption.
© Hypatia.Tech. 2024 All rights reserved.